US20190044739A1 - Physically unclonable function with feed-forward addressing and variable latency output - Google Patents
Physically unclonable function with feed-forward addressing and variable latency output Download PDFInfo
- Publication number
- US20190044739A1 US20190044739A1 US15/941,050 US201815941050A US2019044739A1 US 20190044739 A1 US20190044739 A1 US 20190044739A1 US 201815941050 A US201815941050 A US 201815941050A US 2019044739 A1 US2019044739 A1 US 2019044739A1
- Authority
- US
- United States
- Prior art keywords
- output
- logic
- unclonable function
- puf
- challenge
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
- H04L9/3278—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response using physically unclonable functions [PUF]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/30—Arrangements for executing machine instructions, e.g. instruction decode
- G06F9/30098—Register arrangements
- G06F9/3012—Organisation of register space, e.g. banked or distributed register file
- G06F9/30134—Register stacks; shift registers
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M7/00—Conversion of a code where information is represented by a given sequence or number of digits to a code where the same, similar or subset of information is represented by a different sequence or number of digits
- H03M7/30—Compression; Expansion; Suppression of unnecessary data, e.g. redundancy reduction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
Definitions
- Embodiments generally relate to authentication security systems. More particularly, embodiments relate to a physically unclonable function with feed-forward addressing and variable latency output.
- a physically unclonable function may provide a unique identity for a device based on unique physical variations in the device (e.g., sometimes also referred to as physical unclonable function). For example, such variations may occur naturally during semiconductor manufacturing and the PUF may allow differentiation between otherwise identical semiconductor devices.
- a PUF may refer to a physical structure that may be embedded in a physical device such as an integrated circuit (IC).
- FIG. 1 is a block diagram of an example of an electronic processing system according to an embodiment
- FIG. 2 is a block diagram of an example of a semiconductor package apparatus according to an embodiment
- FIG. 3 is a block diagram of another example of a semiconductor package apparatus according to an embodiment
- FIGS. 4A to 4C are flowcharts of an example of a method of generating a response to a challenge according to an embodiment
- FIGS. 5A to 5C are flowcharts of another example of a method of generating a response to a challenge according to an embodiment
- FIGS. 6A to 6C are block diagrams of examples of strong PUF apparatuses according to embodiments.
- FIG. 7 is a block diagram of an example of a strong SRAM PUF apparatus according to an embodiment
- FIG. 8 is a block diagram of another example of a strong SRAM PUF apparatus according to an embodiment
- FIG. 9 is a block diagram of an example of a computing device according to an embodiment.
- FIG. 10 is a block diagram of an example of a processor according to an embodiment.
- FIG. 11 is a block diagram of an example of a computing system according to an embodiment.
- an embodiment of an electronic processing system 10 may include a processor 11 , memory 12 communicatively coupled to the processor 11 , a physically unclonable function (PUF) 13 , and logic 14 communicatively coupled to the processor 11 and the PUF 13 .
- the PUF 13 and suitable logic 14 may provide a security primitive which may be beneficial to authenticate the system 10 .
- the logic 14 may include technology to decorrelate a challenge sent to the system 10 from an actual challenge provided to the PUF 13 (e.g., at the front end), and/or to decorrelate a response returned to the challenger from an actual response generated by the PUF 13 (e.g., at the back end).
- the front-end decorrelation may be independent from the back-end decorrelation.
- the system 10 may include only the front-end decorrelation, only the back-end decorrelation, or the system 10 may include both the front-end decorrelation and the back-end decorrelation.
- the logic 14 may be configured to generate a first output from the PUF 13 based on a challenge, modify the challenge based on the first output (e.g., a front-end decorrelation), and generate a response based on the modified challenge.
- the PUF 13 may include a static random access memory (SRAM) and the logic 14 may be additionally or alternatively configured to change a read sequence of the SRAM based on an output of the PUF.
- SRAM static random access memory
- the system 10 may additionally or alternatively include a variable latency linear feedback shift register (LFSR) 15 communicatively coupled to the logic 14 (e.g., a back-end decorrelation).
- the logic 14 may be further configured to modify a number of cycles for the variable latency LFSR 15 based on an output from the PUF 13 .
- the system 10 may optionally include a compressor 16 communicatively coupled to the variable latency LFSR 15 to compress the response.
- the PUF 13 may include one or more of a memory-based unclonable function (e.g., a SRAM PUF) and a timing-based unclonable function (e.g., an arbiter PUF, a ring oscillator PUF, etc.).
- a memory-based unclonable function e.g., a SRAM PUF
- a timing-based unclonable function e.g., an arbiter PUF, a ring oscillator PUF, etc.
- the PUF 13 , the logic 14 , the LFSR 15 , and/or the compressor 16 may be located in, or co-located with, various components, including the processor 11 (e.g., on a same die).
- Embodiments of each of the above processor 11 , memory 12 , PUF 13 , logic 14 , LFSR 15 , compressor 16 , and other system components may be implemented in hardware, software, or any suitable combination thereof.
- hardware implementations may include configurable logic such as, for example, programmable logic arrays (PLAs), field programmable gate arrays (FPGAs), complex programmable logic devices (CPLDs), or fixed-functionality logic hardware using circuit technology such as, for example, application specific integrated circuit (ASIC), complementary metal oxide semiconductor (CMOS) or transistor-transistor logic (TTL) technology, or any combination thereof.
- PLAs programmable logic arrays
- FPGAs field programmable gate arrays
- CPLDs complex programmable logic devices
- ASIC application specific integrated circuit
- CMOS complementary metal oxide semiconductor
- TTL transistor-transistor logic
- all or portions of these components may be implemented in one or more modules as a set of logic instructions stored in a machine- or computer-readable storage medium such as random access memory (RAM), read only memory (ROM), programmable ROM (PROM), firmware, flash memory, etc., to be executed by a processor or computing device.
- computer program code to carry out the operations of the components may be written in any combination of one or more operating system (OS) applicable/appropriate programming languages, including an object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- OS operating system
- the memory 12 persistent storage media, or other system memory may store a set of instructions which when executed by the processor 11 cause the system 10 to implement one or more components, features, or aspects of the system 10 (e.g., the logic 14 , generating output from the PUF based on a challenge, modifying the challenge based on the PUF output, generating a response based on the modified challenge, varying a latency of the LFSR, etc.).
- the logic 14 generating output from the PUF based on a challenge, modifying the challenge based on the PUF output, generating a response based on the modified challenge, varying a latency of the LFSR, etc.
- an embodiment of a semiconductor package apparatus 20 may include one or more substrates 21 , a PUF 22 coupled to the one or more substrates, and logic 23 coupled to the PUF 22 and the one or more substrates 21 , wherein the logic 23 may be at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic.
- the PUF 22 and suitable logic 23 may provide a security primitive which may be beneficial to authenticate the apparatus 20 .
- the logic 23 may be configured to generate a first output from the PUF 22 based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge.
- the PUF 22 may include a SRAM and the logic 23 may be additionally or alternatively configured to change a read sequence of the SRAM based on an output of the PUF.
- the apparatus 20 may additionally include a variable latency LFSR 24 communicatively coupled to the logic 23 .
- the logic 23 may be configured to modify a number of cycles for the variable latency LFSR 24 based on an output from the PUF 22 .
- the apparatus 20 may optionally also include a compressor 25 communicatively coupled to the variable latency LFSR 24 to compress the response.
- the PUF 22 may include one or more of a memory-based unclonable function and a timing-based unclonable function.
- the logic 23 coupled to the one or more substrates 21 may include transistor channel regions that are positioned within the one or more substrates 21 .
- an embodiment of a semiconductor package apparatus 30 may include one or more substrates 31 , a PUF 32 coupled to the one or more substrates 31 , a LFSR 33 communicatively coupled to the one or more substrates 31 , and logic 34 coupled to the PUF 32 , the LFSR 33 , and to the one or more substrates 31 .
- logic 34 may be at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic.
- the PUF 32 and suitable logic 34 may provide a security primitive which may be beneficial to authenticate the apparatus 30 .
- the logic 34 coupled to the one or more substrates 31 may be configured to generate an output from the PUF 32 based on a challenge, vary a latency of the LFSR 33 based on the output from the PUF 32 , and generate a response based on an output of the LFSR 33 .
- the logic 34 may be further configured to modify a number of cycles for the LFSR 33 based on the output from the PUF 32 .
- the apparatus 30 may optionally include a compressor 35 communicatively coupled to the LFSR 33 to compress the response.
- the logic 34 may be additionally configured to modify the challenge based on the output of the PUF 32 .
- the PUF 32 may include one or more of a memory-based unclonable function and a timing-based unclonable function.
- the logic 34 coupled to the one or more substrates 31 may include transistor channel regions that are positioned within the one or more substrates.
- Embodiments of the PUF 22 , the logic 23 , the LFSR 24 , the compressor 25 , and other components of the apparatus 20 , the PUF 32 , the LFSR 33 , the logic 34 , the compressor 35 , and other components of the apparatus 30 may be implemented in hardware, software, or any combination thereof including at least a partial implementation in hardware.
- hardware implementations may include configurable logic such as, for example, PLAs, FPGAs, CPLDs, or fixed-functionality logic hardware using circuit technology such as, for example, ASIC, CMOS, or TTL technology, or any combination thereof.
- portions of these components may be implemented in one or more modules as a set of logic instructions stored in a machine- or computer-readable storage medium such as RAM, ROM, PROM, firmware, flash memory, etc., to be executed by a processor or computing device.
- computer program code to carry out the operations of the components may be written in any combination of one or more OS applicable/appropriate programming languages, including an object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- an embodiment of a method 40 of generating a response to a challenge may include generating a first output from a PUF based on a challenge at block 41 , modifying the challenge based on the first output at block 42 , and generating a response based on the modified challenge at block 43 .
- the PUF may include one or more of a memory-based unclonable function and a timing-based unclonable function at block 44 .
- the PUF may include a SRAM and the method 40 may additionally or alternatively include changing a read sequence of the SRAM based on an output of the PUF at block 45 .
- the method 40 may further include varying a latency of a LFSR based on an output from the PUF at block 46 .
- the method 40 may include modifying a number of cycles for the LFSR based on an output from the PUF at block 47 , and/or compressing an output of the LFSR to provide the response at block 48 .
- an embodiment of a method 50 of generating a response to a challenge may include generating an output from a PUF based on a challenge at block 51 , varying a latency of a LFSR based on the output from the PUF at block 52 , and generating a response based on an output of the LFSR at block 53 .
- the method 50 may further include modifying a number of cycles for the LFSR based on the output from the PUF at block 54 , and/or compressing the response at block 55 .
- Some embodiments of the method 50 may additionally include modifying the challenge based on the output of the PUF at block 56 .
- the PUF may include one or more of a memory-based unclonable function and a timing-based unclonable function at block 57 .
- Embodiments of the methods 40 , 50 may be implemented in a system, apparatus, computer, device, etc., for example, such as those described herein. More particularly, hardware implementations of the methods 40 , 50 may include configurable logic such as, for example, PLAs, FPGAs, CPLDs, or in fixed-functionality logic hardware using circuit technology such as, for example, ASIC, CMOS, or TTL technology, or any combination thereof Alternatively, or additionally, the methods 40 , 50 may be implemented in one or more modules as a set of logic instructions stored in a machine- or computer-readable storage medium such as RAM, ROM, PROM, firmware, flash memory, etc., to be executed by a processor or computing device.
- a machine- or computer-readable storage medium such as RAM, ROM, PROM, firmware, flash memory, etc.
- computer program code to carry out the operations of the components may be written in any combination of one or more OS applicable/appropriate programming languages, including an object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like
- conventional procedural programming languages such as the “C” programming language or similar programming languages.
- the methods 40 , 50 may be implemented on a computer readable medium as described in connection with Examples 31 to 35 and/or Examples 41 to 46 below.
- Embodiments or portions of the methods 40 , 50 may be implemented in firmware, applications (e.g., through an application programming interface (API)), or driver software running on an operating system (OS).
- API application programming interface
- OS operating system
- the apparatus 20 ( FIG. 2 ) and/or the apparatus 30 ( FIG. 3 ) may implement one or more aspects of the method 40 ( FIGS. 4A to 4C ), the method 50 ( FIGS. 5A to 5C ), or any of the embodiments discussed herein.
- the illustrated apparatuses 20 , 30 may include one or more substrates (e.g., silicon, sapphire, gallium arsenide) and logic (e.g., transistor array and other integrated circuit/IC components) coupled to the substrate(s).
- the logic e.g., logic 23 , logic 34
- the logic may include transistor channel regions that are positioned (e.g., embedded) within the substrate(s).
- the interface between the logic and the substrate(s) in FIGS. 2 and 3 may not be an abrupt junction.
- the logic may also be considered to include an epitaxial layer that is grown on an initial wafer of the substrate(s).
- an embodiment of a strong PUF apparatus 60 may include a PUF 61 a, a feed-forward module 62 a, and a variable latency output module 63 a (e.g., see FIG. 6A ).
- Another embodiment of a strong PUF apparatus 65 may include a PUF 61 b and a feed-forward module 62 b (e.g., see FIG. 6B ).
- Another embodiment of a strong PUF apparatus 67 may include a PUF 61 c and a variable latency output module 63 c (e.g., see FIG. 6C ).
- the feed-forward modules 62 a - b may provide a front-end decorrelation between a submitted challenge and an actual challenge provided to the PUFs 61 a - b.
- the variable latency output modules 63 a, 63 c may provide a back-end decorrelation between a response returned to the challenger and an actual response generated by the PUFs 61 a, 61 c.
- the feed-forward module 62 b and the variable latency output module 63 c may independently improve the resistance of the apparatuses 65 and 67 to attacks on the corresponding PUFs 61 b, 61 c, and may provide even more resistance to such attacks on the PUF 61 a when utilized together in the apparatus 60 .
- Embodiments of the PUFs 61 a - c, the feed-forward modules 62 a - b, the variable latency output modules 63 a, 63 c, and other components of the strong PUF apparatuses 60 , 65 , and 67 may be implemented in hardware, software, or any combination thereof including at least a partial implementation in hardware.
- hardware implementations may include configurable logic such as, for example, PLAs, FPGAs, CPLDs, or fixed-functionality logic hardware using circuit technology such as, for example, ASIC, CMOS, or TTL technology, or any combination thereof.
- portions of these components may be implemented in one or more modules as a set of logic instructions stored in a machine- or computer-readable storage medium such as RAM, ROM, PROM, firmware, flash memory, etc., to be executed by a processor or computing device.
- computer program code to carry out the operations of the components may be written in any combination of one or more OS applicable/appropriate programming languages, including an object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- Some embodiments may advantageously provide a machine learning (ML) attack resistant SRAM strong PUF using feed-forward addressing and/or a variable latency output LFSR. Strong PUF may be beneficial for various authentication purposes. However, some PUF architectures such as the arbiter PUF or XOR arbiter PUF may be successfully attacked and their response may be anticipated using various ML algorithms. Some embodiments may advantageously provide a more ML attack-resistant PUF which may be suitable for secure authentication applications.
- ML machine learning
- an SRAM array may provide the source of entropy for the PUF (e.g., a strong SRAM PUF device).
- a challenge-response operation may be performed in a 2-step process. First, the challenge may be used to generate an initial response from the SRAM array. Second, the initial response may be used to either modify the input challenge or change the read sequence of the array based on the input challenge.
- a feed-forward technique may limit the visibility for an attacker to accurately model the SRAM locations read or the sequence of read operation, thereby providing resistance to ML modelling attacks.
- a multibit output from the SRAM array, using the modified challenge may be compressed to a one or more bit response through a variable latency linear feedback shift register (LFSR).
- LFSR variable latency linear feedback shift register
- an output compressor may provide further resistance against ML based attacks. By obfuscating the starting seed as well as the number of cycles an LFSR runs, some embodiments may make it more challenging to determine the conditions that generate a specific output.
- some embodiments may provide a hash like one-way operation improving ML resistance with significantly less cost.
- the output of the LFSR may also be compressed using a compressor to further obfuscate the output response.
- the PUF operation may be implemented in a 2-pass process to provide feed-forward addressing.
- the feed-forward addressing may reduce the visibility for an attacker to model the SRAM locations accessed and the read sequence for any given challenge.
- an output LFSR with variable latency counter may be utilized to increase the PUF's resistance against ML attacks.
- the output bit-stream of the LFSR may be compressed using an output compressor (e.g., successive XOR) to produce a response of fewer than ‘p’ bits.
- an output compressor e.g., successive XOR
- these measures together may provide significant resistance against ML and other attacks.
- Some other technology for combining multiple response bits from PUFs to increase ML attack resistance may include XOR-ing or the use of crypto/hash functions.
- an XOR function may increases the non-linearity of the output, it does not exploit the order of response bits to increase ML attack resistance.
- Using a hash function or ciphers may have significant silicon area and/or power overhead.
- some embodiments may provide address feed-forwarding with little or no additional hardware or impact on the cost, silicon area, and/or power overhead.
- the variable latency LFSR may introduce an order based non-linearity to the final output response at a lower implementation cost as compared to hash functions.
- An XOR function can then be used to compress the LFSR output, while still maintaining the order-based non-linearity introduced by the LFSR.
- challenges may be sent to the address decoder which leads to significantly large array sizes. For example, for a 64 bit challenge, 2 64 SRAM cells may be required (e.g., over 18 quintillion).
- some embodiments may substantially reduce the number of SRAM cells needed. For example, some embodiments may utilize only 2*k SRAM cells for a k bit challenge.
- a strong SRAM PUF apparatus 70 may include a SRAM 71 as a source of entropy.
- the SRAM 71 may have a size of 2*k bits organized as 2k rows and a single column, with address locations from 0 to 2*k ⁇ 1.
- a k-bit challenge may be stored in a k-bit register 72 which may be coupled to the SRAM 71 .
- An output of the SRAM 71 may be coupled to a q-bit down counter 73 and a p-bit LFSR 74 .
- the output of the SRAM 71 may also be fed back to the register 72 .
- An output of the down counter 73 may be coupled to the LFSR 74 .
- a k-bit address decoder 75 may be coupled between a log 2 k-bit counter 76 and the register 72 .
- An output of the LFSR 74 may be coupled to a compressor 77 which may provide the final response to the challenge.
- the strong SRAM PUF apparatus 70 may provide a variable latency output from the LFSR 74 .
- an SRAM array of 128 ⁇ 1 may provide the source of entropy for the PUF apparatus 70 and may provide a challenge-response space of 2 64 .
- Some embodiments may utilize 2*k memory addresses for a k bit challenge (e.g., as explained below).
- the PUF operation may be executed in two passes. In the first pass, the content (e.g., 64 addresses out of 128) of the SRAM 71 may be read. The content may be fed back to determine an updated SRAM address for the second pass. In the second pass, the content of the SRAM 71 may be read and loaded into the LFSR 74 and the down counter 73 .
- the output of the counter 76 may be decoded by the address decoder 75 to ensure that at any given moment, only one row of the SRAM 71 is enabled.
- the output of the SRAM addresses may be read sequentially as the counter sequence moves forward, and the SRAM memory contents may be fed back and XORed with the corresponding challenge bit stored in the front-end register.
- This loop may be executed 64 times, and at the end of the loop, the register 72 stores an updated challenge (e.g., or wordline) value.
- some embodiments may make it more difficult for an attacker to accurately model the set of addresses used to generate the response, reducing the effectiveness of ML algorithms to model the PUF.
- the counter 76 may start counting again.
- the read output of the first p bits may be loaded in the p-bit wide LFSR 74 . If the LFSR 74 is of maximal length, the cycle time of the LFSR 74 may be (2p ⁇ 1).
- the count of the down counter 73 may be random because the initial value of the down counter 73 depends on the content of the SRAM 71 , and advantageously may provide resistance against ML attacks.
- the down counter 73 may enable the LFSR 74 to rotate its content in a predetermined order which may further obfuscate the response.
- the output(s) of the LFSR 74 may be sent to the output compressor 77 which may produce a single bit or multi-bit output for the final response.
- the feed-forward addressing and variable latency output of the strong SRAM PUF apparatus 70 may isolate the SRAM 71 from an attacker. For example, the apparatus 70 may significantly increase the number of challenge/response pairs that a ML attacker may need to create an attack model.
- an embodiment of a strong SRAM PUF 80 may include a SRAM 81 as a source of entropy.
- the SRAM 81 may have a size of 2*k ⁇ 1 bit, with address locations from 0 to 2*k ⁇ 1.
- a k-bit challenge may be stored in a k-bit register 82 which may be coupled to the SRAM 81 .
- An output of the SRAM 81 may be coupled to a q-bit down counter 83 and a first LFSR 84 (e.g., a p-bit LFSR).
- An output of the down counter 83 may be coupled to the first LFSR 84 .
- the output of the SRAM 81 may also be fed back to a second LFSR 88 (e.g., a log 2 k-bit LFSR).
- An output of the second LFSR 88 may be coupled to a log 2 k multiplexer (MUX) 89 .
- An output of a log 2 k counter 86 may also be coupled to the MUX 89 .
- a log 2 k-bit address decoder 85 may be coupled between the MUX 89 and the register 82 .
- An output of the first LFSR 84 may be coupled to a compressor 87 which may provide the final response to the challenge.
- the strong SRAM PUF apparatus 80 may provide a variable latency output from the first LFSR 84 .
- the MUX 89 may select the up (or down) counter 86 in the first pass.
- the bits of the counter 86 may be decoded by the address decoder 85 and an appropriate wordline may be selected.
- the content of six (6) SRAM locations may be stored in the second LFSR 88 which may provide a seed for address generation in the second pass.
- the MUX 89 may select the second LFSR 88 for a pseudo-random address sequence generation. Because the output of the PUF employs another LFSR (the first LFSR 84 ), the order of the output bits may also define the seed of the first LFSR 84 and also the final response. After the first LFSR 84 is seeded and the down counter 83 is set, the second pass may be executed as described above in connection with FIG. 7 .
- the feed-forward addressing and variable latency output of the strong SRAM PUF apparatus 80 may isolate the SRAM 81 from an attacker. For example, the apparatus 80 may significantly increase the number of challenge/response pairs that a ML attacker may need to create an attack model.
- the second LFSR 88 may need to be a minimum size of log2(k) to access all the 64-bits of the challenge. However, this will use only 6 feed forward bits, which may not be enough to completely de-correlate the challenge from the actual challenge used. In some embodiments, a wider second LFSR 88 may be used with 6 or more feed-forward bits used to seed it, thereby increasing the number of SRAM bits participating in the feedforward and hence providing better decorrelation of the challenge.
- variable latency output LFSR may be independent of the PUF implementation.
- the variable latency output LFSR may be implemented with timing-based PUFs such as an arbiter PUF, a ring oscillator PUF, etc.
- timing-based PUFs such as an arbiter PUF, a ring oscillator PUF, etc.
- timing attacks due to the variable latency may be hidden from an attacker by providing the final response at a fixed pre-determined latency.
- the output compressor block may be implemented as a sequence dependent function, etc.
- the strong SRAM PUFs 70 , 80 are only illustrative example implementations of suitable feed-forward and variable latency logic. Given the benefit of the present application, numerous other implementations of suitable feed-forward and variable latency logic/circuits/modules will occur to those skilled in the art.
- FIG. 9 shows a computing device 158 that may be readily substituted for one or more of the electronic processing system 10 ( FIG. 1 ), the semiconductor apparatuses 20 , 30 ( FIGS. 2, 3 ), or may include the strong PUF apparatuses 60 , 65 , 67 ( FIGS. 6A to 6C ), the strong SRAM PUF apparatus 70 ( FIG. 7 ), and/or the strong SRAM PUF apparatus 80 ( FIG. 8 ), already discussed.
- the device 158 includes a time source 160 (e.g., crystal oscillator, clock), a battery 162 to supply power to the device 158 , a transceiver 164 (e.g., wireless or wired), a display 166 and mass storage 168 (e.g., hard disk drive/HDD, solid state disk/SSD, optical disk, flash memory).
- the device 158 may also include a host processor 170 (e.g., CPU) having an integrated memory controller (IMC) 172 , which may communicate with system memory 174 .
- IMC integrated memory controller
- the system memory 174 may include, for example, dynamic random access memory (DRAM) configured as one or more memory modules such as, for example, dual inline memory modules (DIMMs), small outline DIMMs (SODIMMs), etc.
- DRAM dynamic random access memory
- the illustrated device 158 also includes an input output (IO) module 176 implemented together with the processor 170 on a semiconductor die 178 as a system on chip (SoC), wherein the I 0 module 176 functions as a host device and may communicate with, for example, the display 166 , the transceiver 164 , the mass storage 168 , and so forth.
- the mass storage 168 may include non-volatile memory (NVM) that stores one or more keys (e.g., MAC generation keys, encryption keys).
- NVM non-volatile memory
- the IO module 176 may include logic 180 that causes the semiconductor die 178 to implement a strong PUF such as described in connection with, for example, the electronic processing system 10 ( FIG. 1 ), the semiconductor apparatuses 20 , 30 ( FIGS. 2, 3 ), or may include the strong PUF apparatuses 60 , 65 , 67 ( FIGS. 6A to 6C ), the strong SRAM PUF apparatus 70 ( FIG. 7 ), and/or the strong SRAM PUF apparatus 80 ( FIG. 8 ).
- the logic 180 may generate a first output from a PUF based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge.
- the logic 180 may generate a first output from a SRAM PUF based on a challenge, change a read sequence of the SRAM PUF based on the first output of the SRAM PUF, and generate a response based on the changed read sequence
- the logic 180 may additionally or alternatively generate an output from a PUF based on a challenge, vary a latency of a LFSR based on the output from the PUF, and generate a response based on an output of the LFSR. For example, the logic 180 may modify a number of cycles for the LFSR based on the output from the PUF. In some embodiments, the logic 180 may also compress the response. In one example, the time source 160 is autonomous/independent from the controller in order to enhance security (e.g., to prevent the controller from tampering with cadence, frequency, latency and/or timestamp data). The logic 180 may also be implemented elsewhere in the device 158 .
- FIG. 10 illustrates a processor core 200 according to one embodiment.
- the processor core 200 may be the core for any type of processor, such as a micro-processor, an embedded processor, a digital signal processor (DSP), a network processor, or other device to execute code. Although only one processor core 200 is illustrated in FIG. 10 , a processing element may alternatively include more than one of the processor core 200 illustrated in FIG. 10 .
- the processor core 200 may be a single-threaded core or, for at least one embodiment, the processor core 200 may be multithreaded in that it may include more than one hardware thread context (or “logical processor”) per core.
- FIG. 10 also illustrates a memory 270 coupled to the processor core 200 .
- the memory 270 may be any of a wide variety of memories (including various layers of memory hierarchy) as are known or otherwise available to those of skill in the art.
- the memory 270 may include one or more code 213 instruction(s) to be executed by the processor core 200 , wherein the code 213 may implement the method 40 ( FIGS. 4A to 4C ), the method 50 ( FIGS. 5A to 5C ) and/or the respective first and second passes ( FIGS. 7 and 8 ), already discussed.
- the processor core 200 follows a program sequence of instructions indicated by the code 213 . Each instruction may enter a front end portion 210 and be processed by one or more decoders 220 .
- the processor core 200 is shown including execution logic 250 having a set of execution units 255 - 1 through 255 -N. Some embodiments may include a number of execution units dedicated to specific functions or sets of functions. Other embodiments may include only one execution unit or one execution unit that can perform a particular function.
- the illustrated execution logic 250 performs the operations specified by code instructions.
- back end logic 260 retires the instructions of the code 213 .
- the processor core 200 allows out of order execution but requires in order retirement of instructions.
- Retirement logic 265 may take a variety of forms as known to those of skill in the art (e.g., re-order buffers or the like). In this manner, the processor core 200 is transformed during execution of the code 213 , at least in terms of the output generated by the decoder, the hardware registers and tables utilized by the register renaming logic 225 , and any registers (not shown) modified by the execution logic 250 .
- a processing element may include other elements on chip with the processor core 200 .
- a processing element may include memory control logic along with the processor core 200 .
- the processing element may include I/O control logic and/or may include I/O control logic integrated with memory control logic.
- the processing element may also include one or more caches.
- FIG. 11 shown is a block diagram of a computing system 1000 embodiment in accordance with an embodiment. Shown in FIG. 11 is a multiprocessor system 1000 that includes a first processing element 1070 and a second processing element 1080 . While two processing elements 1070 and 1080 are shown, it is to be understood that an embodiment of the system 1000 may also include only one such processing element.
- the system 1000 is illustrated as a point-to-point interconnect system, wherein the first processing element 1070 and the second processing element 1080 are coupled via a point-to-point interconnect 1050 . It should be understood that any or all of the interconnects illustrated in FIG. 11 may be implemented as a multi-drop bus rather than point-to-point interconnect.
- each of processing elements 1070 and 1080 may be multicore processors, including first and second processor cores (i.e., processor cores 1074 a and 1074 b and processor cores 1084 a and 1084 b ).
- Such cores 1074 a, 1074 b, 1084 a, 1084 b may be configured to execute instruction code in a manner similar to that discussed above in connection with FIG. 10 .
- Each processing element 1070 , 1080 may include at least one shared cache 1896 a, 1896 b.
- the shared cache 1896 a, 1896 b may store data (e.g., instructions) that are utilized by one or more components of the processor, such as the cores 1074 a, 1074 b and 1084 a, 1084 b, respectively.
- the shared cache 1896 a, 1896 b may locally cache data stored in a memory 1032 , 1034 for faster access by components of the processor.
- the shared cache 1896 a, 1896 b may include one or more mid-level caches, such as level 2 (L2), level 3 (L3), level 4 (L4), or other levels of cache, a last level cache (LLC), and/or combinations thereof.
- L2 level 2
- L3 level 3
- L4 level 4
- LLC last level cache
- processing elements 1070 , 1080 may be present in a given processor.
- processing elements 1070 , 1080 may be an element other than a processor, such as an accelerator or a field programmable gate array.
- additional processing element(s) may include additional processors(s) that are the same as a first processor 1070 , additional processor(s) that are heterogeneous or asymmetric to processor a first processor 1070 , accelerators (such as, e.g., graphics accelerators or digital signal processing (DSP) units), field programmable gate arrays, or any other processing element.
- accelerators such as, e.g., graphics accelerators or digital signal processing (DSP) units
- DSP digital signal processing
- processing elements 1070 , 1080 there can be a variety of differences between the processing elements 1070 , 1080 in terms of a spectrum of metrics of merit including architectural, micro architectural, thermal, power consumption characteristics, and the like. These differences may effectively manifest themselves as asymmetry and heterogeneity amongst the processing elements 1070 , 1080 .
- the various processing elements 1070 , 1080 may reside in the same die package.
- the first processing element 1070 may further include memory controller logic (MC) 1072 and point-to-point (P-P) interfaces 1076 and 1078 .
- the second processing element 1080 may include a MC 1082 and P-P interfaces 1086 and 1088 .
- MC's 1072 and 1082 couple the processors to respective memories, namely a memory 1032 and a memory 1034 , which may be portions of main memory locally attached to the respective processors. While the MC 1072 and 1082 is illustrated as integrated into the processing elements 1070 , 1080 , for alternative embodiments the MC logic may be discrete logic outside the processing elements 1070 , 1080 rather than integrated therein.
- the first processing element 1070 and the second processing element 1080 may be coupled to an I/O subsystem 1090 via P-P interconnects 1076 1086 , respectively.
- the I/O subsystem 1090 includes P-P interfaces 1094 and 1098 .
- I/O subsystem 1090 includes an interface 1092 to couple I/O subsystem 1090 with a high performance graphics engine 1038 .
- bus 1049 may be used to couple the graphics engine 1038 to the I/O subsystem 1090 .
- a point-to-point interconnect may couple these components.
- I/O subsystem 1090 may be coupled to a first bus 1016 via an interface 1096 .
- the first bus 1016 may be a Peripheral Component Interconnect (PCI) bus, or a bus such as a PCI Express bus or another third generation I/O interconnect bus, although the scope of the embodiments is not so limited.
- PCI Peripheral Component Interconnect
- various I/O devices 1014 may be coupled to the first bus 1016 , along with a bus bridge 1018 which may couple the first bus 1016 to a second bus 1020 .
- the second bus 1020 may be a low pin count (LPC) bus.
- Various devices may be coupled to the second bus 1020 including, for example, a keyboard/mouse 1012 , communication device(s) 1026 , and a data storage unit 1019 such as a disk drive or other mass storage device which may include code 1030 , in one embodiment.
- the illustrated code 1030 may implement the method 40 ( FIGS. 4A to 4C ), the method 50 ( FIGS.
- an audio I/O 1024 may be coupled to second bus 1020 and a battery port 1010 may supply power to the computing system 1000 .
- a system may implement a multi-drop bus or another such communication topology.
- the elements of FIG. 11 may alternatively be partitioned using more or fewer integrated chips than shown in FIG. 11 .
- Example 1 may include an electronic processing system, comprising a processor, memory communicatively coupled to the processor, a PUF, and logic communicatively coupled to the processor and the PUF to generate a first output from the PUF based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge.
- Example 2 may include the system of Example 1, wherein the PUF comprises a SRAM, and wherein the logic is further to change a read sequence of the SRAM based on an output of the PUF.
- Example 3 may include the system of Example 1, further comprising a variable latency LFSR communicatively coupled to the logic.
- Example 4 may include the system of Example 3, wherein the logic is further to modify a number of cycles for the variable latency LFSR based on an output from the PUF.
- Example 5 may include the system of Example 4, further comprising a compressor communicatively coupled to the variable latency LFSR to compress the response.
- Example 6 may include the system of any of Examples 1 to 5, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 7 may include a semiconductor package apparatus, comprising one or more substrates, and a PUF coupled to the one or more substrates, and logic coupled to the PUF and to the one or more substrates, wherein the logic is at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic, the logic coupled to the one or more substrates to generate a first output from the PUF based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge.
- Example 8 may include the apparatus of Example 7, wherein the PUF comprises a SRAM, and wherein the logic is further to change a read sequence of the SRAM based on an output of the PUF.
- Example 9 may include the apparatus of Example 7, further comprising a variable latency LFSR communicatively coupled to the logic.
- Example 10 may include the apparatus of Example 9, wherein the logic is further to modify a number of cycles for the variable latency LFSR based on an output from the PUF.
- Example 11 may include the apparatus of Example 10, further comprising a compressor communicatively coupled to the variable latency LFSR to compress the response.
- Example 12 may include the apparatus of any of Examples 7 to 11, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 13 may include the apparatus of any of Examples 7 to 11, wherein the logic coupled to the one or more substrates includes transistor channel regions that are positioned within the one or more substrates.
- Example 14 may include a method of generating a response to a challenge, comprising generating a first output from a PUF based on a challenge, modifying the challenge based on the first output, and generating a response based on the modified challenge.
- Example 15 may include the method of Example 14, wherein the PUF comprises a SRAM, the method further comprising changing a read sequence of the SRAM based on an output of the PUF.
- Example 16 may include the method of Example 14, further comprising varying a latency of a LFSR based on an output from the PUF.
- Example 17 may include the method of Example 16, further comprising modifying a number of cycles for the LFSR based on an output from the PUF.
- Example 18 may include the method of Example 17, further comprising compressing an output of the LFSR to provide the response.
- Example 19 may include the method of any of Examples 14 to 18, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 20 may include a semiconductor package apparatus, comprising one or more substrates, and a PUF coupled to the one or more substrates, a LFSR communicatively coupled to the one or more substrates, and logic coupled to the PUF, the LFSR, and to the one or more substrates, wherein the logic is at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic, the logic coupled to the one or more substrates to generate an output from the PUF based on a challenge, vary a latency of the LFSR based on the output from the PUF, and generate a response based on an output of the LFSR.
- a semiconductor package apparatus comprising one or more substrates, and a PUF coupled to the one or more substrates, a LFSR communicatively coupled to the one or more substrates, and logic coupled to the PUF, the LFSR, and to the one or more substrates, wherein the logic is at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic, the logic
- Example 21 may include the apparatus of Example 20, wherein the logic is further to modify a number of cycles for the LFSR based on the output from the PUF.
- Example 22 may include the apparatus of Example 20, further comprising a compressor communicatively coupled to the LFSR to compress the response.
- Example 23 may include the apparatus of Example 20, wherein the logic is further to modify the challenge based on the output of the PUF.
- Example 24 may include the apparatus of any of Examples 20 to 23, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 25 may include the apparatus of any of Examples 20 to 23, wherein the logic coupled to the one or more substrates includes transistor channel regions that are positioned within the one or more substrates.
- Example 26 may include a method of generating a response to a challenge, comprising generating an output from a PUF based on a challenge, varying a latency of a LFSR based on the output from the PUF, and generating a response based on an output of the LFSR.
- Example 27 may include the method of Example 26, further comprising modifying a number of cycles for the LFSR based on the output from the PUF.
- Example 28 may include the method of Example 26, further comprising compressing the response.
- Example 29 may include the method of Example 26, further comprising modifying the challenge based on the output of the PUF.
- Example 30 may include the method of any of Examples 26 to 29, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 31 may include at least one computer readable medium, comprising a set of instructions, which when executed by a computing device, cause the computing device to generate an output from a PUF based on a challenge, vary a latency of a LFSR based on the output from the PUF, and generate a response based on an output of the LFSR.
- Example 32 may include the at least one computer readable medium of Example 31, comprising a further set of instructions, which when executed by the computing device, cause the computing device to modify a number of cycles for the LFSR based on the output from the PUF.
- Example 33 may include the at least one computer readable medium of Example 31, comprising a further set of instructions, which when executed by the computing device, cause the computing device to compress the response.
- Example 34 may include the at least one computer readable medium of Example 31, comprising a further set of instructions, which when executed by the computing device, cause the computing device to modify the challenge based on the output of the PUF.
- Example 35 may include the at least one computer readable medium of any of Examples 31 to 34, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 36 may include a strong PUF apparatus, comprising means for generating an output from a PUF based on a challenge, means for varying a latency of a LFSR based on the output from the PUF, and means for generating a response based on an output of the LFSR.
- Example 37 may include the apparatus of Example 36, further comprising means for modifying a number of cycles for the LFSR based on the output from the PUF.
- Example 38 may include the apparatus of Example 36, further comprising means for compressing the response.
- Example 39 may include the apparatus of Example 36, further comprising means for modifying the challenge based on the output of the PUF.
- Example 40 may include the apparatus of any of Examples 36 to 39, wherein PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 41 may include at least one computer readable medium, comprising a set of instructions, which when executed by a computing device, cause the computing device to generate a first output from a PUF based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge.
- Example 42 may include the at least one computer readable medium of Example 41, wherein the PUF comprises a SRAM, comprising a further set of instructions, which when executed by the computing device, cause the computing device to change a read sequence of the SRAM based on an output of the PUF.
- Example 43 may include the at least one computer readable medium of Example 41, comprising a further set of instructions, which when executed by the computing device, cause the computing device to vary a latency of a LFSR based on an output from the PUF.
- Example 44 may include the at least one computer readable medium of Example 43, comprising a further set of instructions, which when executed by the computing device, cause the computing device to modify a number of cycles for the LFSR based on an output from the PUF.
- Example 45 may include the at least one computer readable medium of Example 44, comprising a further set of instructions, which when executed by the computing device, cause the computing device to compress an output of the LFSR to provide the response.
- Example 46 may include the at least one computer readable medium of any of Examples 41 to 45, wherein PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 47 may include a strong PUF apparatus, comprising means for generating a first output from a PUF based on a challenge, means for modifying the challenge based on the first output, and means for generating a response based on the modified challenge.
- Example 48 may include the apparatus of Example 47, wherein the PUF comprises a SRAM, the apparatus further comprising means for changing a read sequence of the SRAM based on an output of the PUF.
- Example 49 may include the apparatus of Example 47, further comprising means for varying a latency of a LFSR based on an output from the PUF.
- Example 50 may include the apparatus of Example 49, further comprising means for modifying a number of cycles for the LFSR based on an output from the PUF.
- Example 51 may include the apparatus of Example 50, further comprising means for compressing an output of the LFSR to provide the response.
- Example 52 may include the apparatus of any of Examples 47 to 51, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 53 may include an electronic processing system, comprising a processor, memory communicatively coupled to the processor, a SRAM PUF, and logic communicatively coupled to the processor and the SRAM PUF to generate a first output from the SRAM PUF based on a challenge, change a read sequence of the SRAM PUF based on the first output of the SRAM PUF, and generate a response based on the changed read sequence.
- Example 54 may include the system of Example 53, further comprising a variable latency LFSR communicatively coupled to the logic.
- Example 55 may include the system of Example 54, wherein the logic is further to modify a number of cycles for the variable latency LFSR based on a second output from the SRAM PUF.
- Example 56 may include the system of Example 55, further comprising a compressor communicatively coupled to the variable latency LFSR to compress the response.
- Example 57 may include a semiconductor package apparatus, comprising one or more substrates, and a SRAM PUF coupled to the one or more substrates, and logic coupled to the SRAM PUF and to the one or more substrates, wherein the logic is at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic, the logic coupled to the one or more substrates to generate a first output from the SRAM PUF based on a challenge, change a read sequence of the SRAM PUF based on the first output of the SRAM PUF, and generate a response based on the changed read sequence.
- Example 58 may include the apparatus of Example 57, further comprising a variable latency LFSR communicatively coupled to the logic.
- Example 59 may include the apparatus of Example 58, wherein the logic is further to modify a number of cycles for the variable latency LFSR based on a second output from the SRAM PUF.
- Example 60 may include the apparatus of Example 59, further comprising a compressor communicatively coupled to the variable latency LFSR to compress the response.
- Example 61 may include the apparatus of any of Examples 57 to 60, wherein the logic coupled to the one or more substrates includes transistor channel regions that are positioned within the one or more substrates.
- Example 62 may include a method of generating a response to a challenge, comprising generating a first output from a SRAM PUF based on a challenge, changing a read sequence of the SRAM PUF based on the first output of the SRAM PUF, and generating a response based on the changed read sequence.
- Example 63 may include the method of Example 62, further comprising varying a latency of a LFSR based on a second output from the SRAM PUF.
- Example 64 may include the method of Example 63, further comprising modifying a number of cycles for the LFSR based on the second output from the SRAM PUF.
- Example 65 may include the method of Example 64, further comprising compressing an output of the LFSR to provide the response.
- Embodiments are applicable for use with all types of semiconductor integrated circuit (“IC”) chips.
- IC semiconductor integrated circuit
- Examples of these IC chips include but are not limited to processors, controllers, chipset components, programmable logic arrays (PLAs), memory chips, network chips, systems on chip (SoCs), SSD/NAND controller ASICs, and the like.
- PLAs programmable logic arrays
- SoCs systems on chip
- SSD/NAND controller ASICs solid state drive/NAND controller ASICs
- signal conductor lines are represented with lines. Some may be different, to indicate more constituent signal paths, have a number label, to indicate a number of constituent signal paths, and/or have arrows at one or more ends, to indicate primary information flow direction. This, however, should not be construed in a limiting manner.
- Any represented signal lines may actually comprise one or more signals that may travel in multiple directions and may be implemented with any suitable type of signal scheme, e.g., digital or analog lines implemented with differential pairs, optical fiber lines, and/or single-ended lines.
- Example sizes/models/values/ranges may have been given, although embodiments are not limited to the same. As manufacturing techniques (e.g., photolithography) mature over time, it is expected that devices of smaller size could be manufactured.
- well known power/ground connections to IC chips and other components may or may not be shown within the figures, for simplicity of illustration and discussion, and so as not to obscure certain aspects of the embodiments. Further, arrangements may be shown in block diagram form in order to avoid obscuring embodiments, and also in view of the fact that specifics with respect to implementation of such block diagram arrangements are highly dependent upon the platform within which the embodiment is to be implemented, i.e., such specifics should be well within purview of one skilled in the art.
- Coupled may be used herein to refer to any type of relationship, direct or indirect, between the components in question, and may apply to electrical, mechanical, fluid, optical, electromagnetic, electromechanical or other connections.
- first”, second”, etc. may be used herein only to facilitate discussion, and carry no particular temporal or chronological significance unless otherwise indicated.
- a list of items joined by the term “one or more of” may mean any combination of the listed terms.
- the phrase “one or more of A, B, and C” and the phrase “one or more of A, B, or C” both may mean A; B; C; A and B; A and C; B and C; or A, B and C.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Semiconductor Memories (AREA)
- Advance Control (AREA)
Abstract
Description
- Embodiments generally relate to authentication security systems. More particularly, embodiments relate to a physically unclonable function with feed-forward addressing and variable latency output.
- A physically unclonable function (PUF) may provide a unique identity for a device based on unique physical variations in the device (e.g., sometimes also referred to as physical unclonable function). For example, such variations may occur naturally during semiconductor manufacturing and the PUF may allow differentiation between otherwise identical semiconductor devices. In cryptography, a PUF may refer to a physical structure that may be embedded in a physical device such as an integrated circuit (IC).
- The various advantages of the embodiments will become apparent to one skilled in the art by reading the following specification and appended claims, and by referencing the following drawings, in which:
-
FIG. 1 is a block diagram of an example of an electronic processing system according to an embodiment; -
FIG. 2 is a block diagram of an example of a semiconductor package apparatus according to an embodiment; -
FIG. 3 is a block diagram of another example of a semiconductor package apparatus according to an embodiment; -
FIGS. 4A to 4C are flowcharts of an example of a method of generating a response to a challenge according to an embodiment; -
FIGS. 5A to 5C are flowcharts of another example of a method of generating a response to a challenge according to an embodiment; -
FIGS. 6A to 6C are block diagrams of examples of strong PUF apparatuses according to embodiments; -
FIG. 7 is a block diagram of an example of a strong SRAM PUF apparatus according to an embodiment; -
FIG. 8 is a block diagram of another example of a strong SRAM PUF apparatus according to an embodiment; -
FIG. 9 is a block diagram of an example of a computing device according to an embodiment; -
FIG. 10 is a block diagram of an example of a processor according to an embodiment; and -
FIG. 11 is a block diagram of an example of a computing system according to an embodiment. - Turning now to
FIG. 1 , an embodiment of anelectronic processing system 10 may include aprocessor 11,memory 12 communicatively coupled to theprocessor 11, a physically unclonable function (PUF) 13, andlogic 14 communicatively coupled to theprocessor 11 and thePUF 13. The PUF 13 andsuitable logic 14 may provide a security primitive which may be beneficial to authenticate thesystem 10. Advantageously, thelogic 14 may include technology to decorrelate a challenge sent to thesystem 10 from an actual challenge provided to the PUF 13 (e.g., at the front end), and/or to decorrelate a response returned to the challenger from an actual response generated by the PUF 13 (e.g., at the back end). The front-end decorrelation may be independent from the back-end decorrelation. In some embodiments, thesystem 10 may include only the front-end decorrelation, only the back-end decorrelation, or thesystem 10 may include both the front-end decorrelation and the back-end decorrelation. - In some embodiments, the
logic 14 may be configured to generate a first output from thePUF 13 based on a challenge, modify the challenge based on the first output (e.g., a front-end decorrelation), and generate a response based on the modified challenge. For example, thePUF 13 may include a static random access memory (SRAM) and thelogic 14 may be additionally or alternatively configured to change a read sequence of the SRAM based on an output of the PUF. - In some embodiments, the
system 10 may additionally or alternatively include a variable latency linear feedback shift register (LFSR) 15 communicatively coupled to the logic 14 (e.g., a back-end decorrelation). For example, thelogic 14 may be further configured to modify a number of cycles for the variable latency LFSR 15 based on an output from thePUF 13. Thesystem 10 may optionally include acompressor 16 communicatively coupled to the variable latency LFSR 15 to compress the response. For example, thePUF 13 may include one or more of a memory-based unclonable function (e.g., a SRAM PUF) and a timing-based unclonable function (e.g., an arbiter PUF, a ring oscillator PUF, etc.). In some embodiments, the PUF 13, thelogic 14, the LFSR 15, and/or thecompressor 16 may be located in, or co-located with, various components, including the processor 11 (e.g., on a same die). - Embodiments of each of the
above processor 11,memory 12, PUF 13,logic 14, LFSR 15,compressor 16, and other system components may be implemented in hardware, software, or any suitable combination thereof. For example, hardware implementations may include configurable logic such as, for example, programmable logic arrays (PLAs), field programmable gate arrays (FPGAs), complex programmable logic devices (CPLDs), or fixed-functionality logic hardware using circuit technology such as, for example, application specific integrated circuit (ASIC), complementary metal oxide semiconductor (CMOS) or transistor-transistor logic (TTL) technology, or any combination thereof. - Alternatively, or additionally, all or portions of these components may be implemented in one or more modules as a set of logic instructions stored in a machine- or computer-readable storage medium such as random access memory (RAM), read only memory (ROM), programmable ROM (PROM), firmware, flash memory, etc., to be executed by a processor or computing device. For example, computer program code to carry out the operations of the components may be written in any combination of one or more operating system (OS) applicable/appropriate programming languages, including an object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. For example, the
memory 12, persistent storage media, or other system memory may store a set of instructions which when executed by theprocessor 11 cause thesystem 10 to implement one or more components, features, or aspects of the system 10 (e.g., thelogic 14, generating output from the PUF based on a challenge, modifying the challenge based on the PUF output, generating a response based on the modified challenge, varying a latency of the LFSR, etc.). - Turning now to
FIG. 2 , an embodiment of asemiconductor package apparatus 20 may include one ormore substrates 21, aPUF 22 coupled to the one or more substrates, andlogic 23 coupled to thePUF 22 and the one ormore substrates 21, wherein thelogic 23 may be at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic. The PUF 22 andsuitable logic 23 may provide a security primitive which may be beneficial to authenticate theapparatus 20. Thelogic 23 may be configured to generate a first output from thePUF 22 based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge. For example, thePUF 22 may include a SRAM and thelogic 23 may be additionally or alternatively configured to change a read sequence of the SRAM based on an output of the PUF. Theapparatus 20 may additionally include a variable latency LFSR 24 communicatively coupled to thelogic 23. For example, thelogic 23 may be configured to modify a number of cycles for the variable latency LFSR 24 based on an output from thePUF 22. Theapparatus 20 may optionally also include acompressor 25 communicatively coupled to the variable latency LFSR 24 to compress the response. For example, thePUF 22 may include one or more of a memory-based unclonable function and a timing-based unclonable function. In some embodiments, thelogic 23 coupled to the one ormore substrates 21 may include transistor channel regions that are positioned within the one ormore substrates 21. - Turning now to
FIG. 3 , an embodiment of asemiconductor package apparatus 30 may include one ormore substrates 31, aPUF 32 coupled to the one ormore substrates 31, aLFSR 33 communicatively coupled to the one ormore substrates 31, andlogic 34 coupled to thePUF 32, theLFSR 33, and to the one ormore substrates 31. For example,logic 34 may be at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic. The PUF 32 andsuitable logic 34 may provide a security primitive which may be beneficial to authenticate theapparatus 30. Thelogic 34 coupled to the one ormore substrates 31 may be configured to generate an output from thePUF 32 based on a challenge, vary a latency of the LFSR 33 based on the output from thePUF 32, and generate a response based on an output of theLFSR 33. For example, thelogic 34 may be further configured to modify a number of cycles for the LFSR 33 based on the output from thePUF 32. Theapparatus 30 may optionally include acompressor 35 communicatively coupled to the LFSR 33 to compress the response. In some embodiments, thelogic 34 may be additionally configured to modify the challenge based on the output of thePUF 32. For example, thePUF 32 may include one or more of a memory-based unclonable function and a timing-based unclonable function. In some embodiments, thelogic 34 coupled to the one ormore substrates 31 may include transistor channel regions that are positioned within the one or more substrates. - Embodiments of the PUF 22, the
logic 23, the LFSR 24, thecompressor 25, and other components of theapparatus 20, the PUF 32, the LFSR 33, thelogic 34, thecompressor 35, and other components of theapparatus 30, may be implemented in hardware, software, or any combination thereof including at least a partial implementation in hardware. For example, hardware implementations may include configurable logic such as, for example, PLAs, FPGAs, CPLDs, or fixed-functionality logic hardware using circuit technology such as, for example, ASIC, CMOS, or TTL technology, or any combination thereof. Additionally, portions of these components may be implemented in one or more modules as a set of logic instructions stored in a machine- or computer-readable storage medium such as RAM, ROM, PROM, firmware, flash memory, etc., to be executed by a processor or computing device. For example, computer program code to carry out the operations of the components may be written in any combination of one or more OS applicable/appropriate programming languages, including an object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. - Turning now to
FIGS. 4A to 4C , an embodiment of amethod 40 of generating a response to a challenge may include generating a first output from a PUF based on a challenge atblock 41, modifying the challenge based on the first output atblock 42, and generating a response based on the modified challenge atblock 43. For example, the PUF may include one or more of a memory-based unclonable function and a timing-based unclonable function atblock 44. In some embodiments, the PUF may include a SRAM and themethod 40 may additionally or alternatively include changing a read sequence of the SRAM based on an output of the PUF atblock 45. In some embodiments, themethod 40 may further include varying a latency of a LFSR based on an output from the PUF atblock 46. For example, themethod 40 may include modifying a number of cycles for the LFSR based on an output from the PUF atblock 47, and/or compressing an output of the LFSR to provide the response atblock 48. - Turning now to
FIGS. 5A to 5C , an embodiment of amethod 50 of generating a response to a challenge may include generating an output from a PUF based on a challenge atblock 51, varying a latency of a LFSR based on the output from the PUF atblock 52, and generating a response based on an output of the LFSR atblock 53. For example, themethod 50 may further include modifying a number of cycles for the LFSR based on the output from the PUF atblock 54, and/or compressing the response atblock 55. Some embodiments of themethod 50 may additionally include modifying the challenge based on the output of the PUF atblock 56. For example, the PUF may include one or more of a memory-based unclonable function and a timing-based unclonable function atblock 57. - Embodiments of the
40, 50 may be implemented in a system, apparatus, computer, device, etc., for example, such as those described herein. More particularly, hardware implementations of themethods 40, 50 may include configurable logic such as, for example, PLAs, FPGAs, CPLDs, or in fixed-functionality logic hardware using circuit technology such as, for example, ASIC, CMOS, or TTL technology, or any combination thereof Alternatively, or additionally, themethods 40, 50 may be implemented in one or more modules as a set of logic instructions stored in a machine- or computer-readable storage medium such as RAM, ROM, PROM, firmware, flash memory, etc., to be executed by a processor or computing device. For example, computer program code to carry out the operations of the components may be written in any combination of one or more OS applicable/appropriate programming languages, including an object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.methods - For example, the
40, 50 may be implemented on a computer readable medium as described in connection with Examples 31 to 35 and/or Examples 41 to 46 below. Embodiments or portions of themethods 40, 50 may be implemented in firmware, applications (e.g., through an application programming interface (API)), or driver software running on an operating system (OS).methods - The apparatus 20 (
FIG. 2 ) and/or the apparatus 30 (FIG. 3 ) may implement one or more aspects of the method 40 (FIGS. 4A to 4C ), the method 50 (FIGS. 5A to 5C ), or any of the embodiments discussed herein. In some embodiments, the illustrated 20, 30 may include one or more substrates (e.g., silicon, sapphire, gallium arsenide) and logic (e.g., transistor array and other integrated circuit/IC components) coupled to the substrate(s). The logic (e.g.,apparatuses logic 23, logic 34) may be implemented at least partly in configurable logic or fixed-functionality logic hardware. In one example, the logic may include transistor channel regions that are positioned (e.g., embedded) within the substrate(s). Thus, the interface between the logic and the substrate(s) inFIGS. 2 and 3 may not be an abrupt junction. The logic may also be considered to include an epitaxial layer that is grown on an initial wafer of the substrate(s). - Turning now to
FIGS. 6A to 6C , some embodiments may be physically or logically arranged as one or more modules. For example, an embodiment of astrong PUF apparatus 60 may include aPUF 61 a, a feed-forward module 62 a, and a variablelatency output module 63 a (e.g., seeFIG. 6A ). Another embodiment of astrong PUF apparatus 65 may include aPUF 61 b and a feed-forward module 62 b (e.g., seeFIG. 6B ). Another embodiment of astrong PUF apparatus 67 may include aPUF 61 c and a variablelatency output module 63 c (e.g., seeFIG. 6C ). Any suitable technology may be utilized for the PUFs 61 a-c (e.g., SRAM PUF, arbiter PUF, ring oscillator PUF, etc.). The feed-forward modules 62 a-b may provide a front-end decorrelation between a submitted challenge and an actual challenge provided to the PUFs 61 a-b. The variable 63 a, 63 c may provide a back-end decorrelation between a response returned to the challenger and an actual response generated by thelatency output modules 61 a, 61 c. Advantageously, the feed-PUFs forward module 62 b and the variablelatency output module 63 c may independently improve the resistance of the 65 and 67 to attacks on the correspondingapparatuses 61 b, 61 c, and may provide even more resistance to such attacks on thePUFs PUF 61 a when utilized together in theapparatus 60. - Embodiments of the PUFs 61 a-c, the feed-forward modules 62 a-b, the variable
63 a, 63 c, and other components of thelatency output modules 60, 65, and 67 may be implemented in hardware, software, or any combination thereof including at least a partial implementation in hardware. For example, hardware implementations may include configurable logic such as, for example, PLAs, FPGAs, CPLDs, or fixed-functionality logic hardware using circuit technology such as, for example, ASIC, CMOS, or TTL technology, or any combination thereof. Additionally, portions of these components may be implemented in one or more modules as a set of logic instructions stored in a machine- or computer-readable storage medium such as RAM, ROM, PROM, firmware, flash memory, etc., to be executed by a processor or computing device. For example, computer program code to carry out the operations of the components may be written in any combination of one or more OS applicable/appropriate programming languages, including an object-oriented programming language such as PYTHON, PERL, JAVA, SMALLTALK, C++, C# or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.strong PUF apparatuses - Some embodiments may advantageously provide a machine learning (ML) attack resistant SRAM strong PUF using feed-forward addressing and/or a variable latency output LFSR. Strong PUF may be beneficial for various authentication purposes. However, some PUF architectures such as the arbiter PUF or XOR arbiter PUF may be successfully attacked and their response may be anticipated using various ML algorithms. Some embodiments may advantageously provide a more ML attack-resistant PUF which may be suitable for secure authentication applications.
- In some embodiments of a strong PUF device, an SRAM array may provide the source of entropy for the PUF (e.g., a strong SRAM PUF device). In some embodiments, a challenge-response operation may be performed in a 2-step process. First, the challenge may be used to generate an initial response from the SRAM array. Second, the initial response may be used to either modify the input challenge or change the read sequence of the array based on the input challenge. Advantageously, some embodiments of a feed-forward technique may limit the visibility for an attacker to accurately model the SRAM locations read or the sequence of read operation, thereby providing resistance to ML modelling attacks.
- In some embodiments, a multibit output from the SRAM array, using the modified challenge, may be compressed to a one or more bit response through a variable latency linear feedback shift register (LFSR). In some embodiments, an output compressor may provide further resistance against ML based attacks. By obfuscating the starting seed as well as the number of cycles an LFSR runs, some embodiments may make it more challenging to determine the conditions that generate a specific output. Advantageously, some embodiments may provide a hash like one-way operation improving ML resistance with significantly less cost. The output of the LFSR may also be compressed using a compressor to further obfuscate the output response.
- For a memory-based PUF device, the PUF operation may be implemented in a 2-pass process to provide feed-forward addressing. The feed-forward addressing may reduce the visibility for an attacker to model the SRAM locations accessed and the read sequence for any given challenge. Further, an output LFSR with variable latency counter may be utilized to increase the PUF's resistance against ML attacks. For example, the multi-bit output (e.g., k bits) of the SRAM may be divided into two segments. The first segment (e.g., p bits) may be loaded into an LFSR. The second segment (e.g., q=k−p bits) may be loaded into a down counter which may determine how many times the LFSR will be clocked. The output bit-stream of the LFSR may be compressed using an output compressor (e.g., successive XOR) to produce a response of fewer than ‘p’ bits. Advantageously, in some embodiments, these measures together may provide significant resistance against ML and other attacks.
- Some other technology for combining multiple response bits from PUFs to increase ML attack resistance may include XOR-ing or the use of crypto/hash functions. Although an XOR function may increases the non-linearity of the output, it does not exploit the order of response bits to increase ML attack resistance. Using a hash function or ciphers may have significant silicon area and/or power overhead. Advantageously, some embodiments may provide address feed-forwarding with little or no additional hardware or impact on the cost, silicon area, and/or power overhead. For example, in some embodiments the variable latency LFSR may introduce an order based non-linearity to the final output response at a lower implementation cost as compared to hash functions. An XOR function can then be used to compress the LFSR output, while still maintaining the order-based non-linearity introduced by the LFSR. In some other SRAM PUF devices, challenges may be sent to the address decoder which leads to significantly large array sizes. For example, for a 64 bit challenge, 264 SRAM cells may be required (e.g., over 18 quintillion). Advantageously, some embodiments may substantially reduce the number of SRAM cells needed. For example, some embodiments may utilize only 2*k SRAM cells for a k bit challenge.
- Turning now to
FIG. 7 , a strongSRAM PUF apparatus 70 may include aSRAM 71 as a source of entropy. For example, theSRAM 71 may have a size of 2*k bits organized as 2k rows and a single column, with address locations from 0 to 2*k−1. A k-bit challenge may be stored in a k-bit register 72 which may be coupled to theSRAM 71. An output of theSRAM 71 may be coupled to a q-bit downcounter 73 and a p-bit LFSR 74. The output of theSRAM 71 may also be fed back to theregister 72. An output of thedown counter 73 may be coupled to theLFSR 74. A k-bit address decoder 75 may be coupled between a log2k-bit counter 76 and theregister 72. An output of theLFSR 74 may be coupled to acompressor 77 which may provide the final response to the challenge. In operation, the strongSRAM PUF apparatus 70 may provide a variable latency output from theLFSR 74. - In some embodiments, the memory size of the
SRAM 71 may be 2*k×1 bits, where k=64. For example, an SRAM array of 128×1 may provide the source of entropy for thePUF apparatus 70 and may provide a challenge-response space of 264. Some embodiments may utilize 2*k memory addresses for a k bit challenge (e.g., as explained below). For illustrative purposes, the following example divides the output of theSRAM 71 into two segments with p=48 and q=16. The PUF operation may be executed in two passes. In the first pass, the content (e.g., 64 addresses out of 128) of theSRAM 71 may be read. The content may be fed back to determine an updated SRAM address for the second pass. In the second pass, the content of theSRAM 71 may be read and loaded into theLFSR 74 and thedown counter 73. - In the first pass, the k-bit (e.g., 64 bit) challenge may be stored in the
input register 72. If a particular challenge is true (or false), a corresponding SRAM odd row (or even row) may be selected, for instance if bit0=0, WLO is selected, else WL1 is selected and if bit1=0, WL2 is selected, else WL3 is selected and so on. Accordingly, for the k-bit challenge, a 2*k memory address space may be needed. The output of the counter 76 may be decoded by theaddress decoder 75 to ensure that at any given moment, only one row of theSRAM 71 is enabled. The output of the SRAM addresses may be read sequentially as the counter sequence moves forward, and the SRAM memory contents may be fed back and XORed with the corresponding challenge bit stored in the front-end register. - For example, a challenge C0=0 may select the wordline WL0, when the counter 76 starts counting. Assuming the content of the selected SRAM location is
logic 1, when the content is fed back and XORed with C0 the XOR operation results in 1 which may be stored in the same location of theregister 72. Consequently, now updated C0=1 which enables the wordline WL1 during the second pass of response generation. This loop may be executed 64 times, and at the end of the loop, theregister 72 stores an updated challenge (e.g., or wordline) value. Advantageously, by executing the first pass, some embodiments may make it more difficult for an attacker to accurately model the set of addresses used to generate the response, reducing the effectiveness of ML algorithms to model the PUF. - In the second pass, the counter 76 may start counting again. The read output of the first p bits may be loaded in the p-bit
wide LFSR 74. If theLFSR 74 is of maximal length, the cycle time of theLFSR 74 may be (2p−1). The rest of the selected bits of the SRAM 71 (e.g., k−p=q) may be loaded into the q-bit down counter 73 which may be capable of counting up to 2*q times. Accordingly, the count of thedown counter 73 may be random because the initial value of thedown counter 73 depends on the content of theSRAM 71, and advantageously may provide resistance against ML attacks. In this duration, the down counter 73 may enable theLFSR 74 to rotate its content in a predetermined order which may further obfuscate the response. The output(s) of theLFSR 74 may be sent to theoutput compressor 77 which may produce a single bit or multi-bit output for the final response. Advantageously, the feed-forward addressing and variable latency output of the strongSRAM PUF apparatus 70 may isolate theSRAM 71 from an attacker. For example, theapparatus 70 may significantly increase the number of challenge/response pairs that a ML attacker may need to create an attack model. - Turning now to
FIG. 8 , an embodiment of astrong SRAM PUF 80 may include aSRAM 81 as a source of entropy. For example, theSRAM 81 may have a size of 2*k×1 bit, with address locations from 0 to 2*k−1. A k-bit challenge may be stored in a k-bit register 82 which may be coupled to theSRAM 81. An output of theSRAM 81 may be coupled to a q-bit downcounter 83 and a first LFSR 84 (e.g., a p-bit LFSR). An output of thedown counter 83 may be coupled to thefirst LFSR 84. The output of theSRAM 81 may also be fed back to a second LFSR 88 (e.g., a log2k-bit LFSR). An output of thesecond LFSR 88 may be coupled to a log2k multiplexer (MUX) 89. An output of alog2k counter 86 may also be coupled to theMUX 89. A log2k-bit address decoder 85 may be coupled between theMUX 89 and theregister 82. An output of thefirst LFSR 84 may be coupled to acompressor 87 which may provide the final response to the challenge. In operation, the strongSRAM PUF apparatus 80 may provide a variable latency output from thefirst LFSR 84. - In some embodiments, the
MUX 89 may select the up (or down) counter 86 in the first pass. For example, the bits of thecounter 86 may be decoded by theaddress decoder 85 and an appropriate wordline may be selected. In this embodiment, thecounter 86 may need to count only six (log264=6) times. The content of six (6) SRAM locations may be stored in thesecond LFSR 88 which may provide a seed for address generation in the second pass. - In the second pass, the
MUX 89 may select thesecond LFSR 88 for a pseudo-random address sequence generation. Because the output of the PUF employs another LFSR (the first LFSR 84), the order of the output bits may also define the seed of thefirst LFSR 84 and also the final response. After thefirst LFSR 84 is seeded and thedown counter 83 is set, the second pass may be executed as described above in connection withFIG. 7 . Advantageously, the feed-forward addressing and variable latency output of the strongSRAM PUF apparatus 80 may isolate theSRAM 81 from an attacker. For example, theapparatus 80 may significantly increase the number of challenge/response pairs that a ML attacker may need to create an attack model. Thesecond LFSR 88 may need to be a minimum size of log2(k) to access all the 64-bits of the challenge. However, this will use only 6 feed forward bits, which may not be enough to completely de-correlate the challenge from the actual challenge used. In some embodiments, a widersecond LFSR 88 may be used with 6 or more feed-forward bits used to seed it, thereby increasing the number of SRAM bits participating in the feedforward and hence providing better decorrelation of the challenge. - As may be apparent to those skilled in the art given the benefit of the present application, the variable latency output LFSR may be independent of the PUF implementation. For example, the variable latency output LFSR may be implemented with timing-based PUFs such as an arbiter PUF, a ring oscillator PUF, etc. In some embodiments (e.g., including memory-based PUFs) timing attacks due to the variable latency may be hidden from an attacker by providing the final response at a fixed pre-determined latency. Similarly, in some embodiments the output compressor block may be implemented as a sequence dependent function, etc. The
70, 80 are only illustrative example implementations of suitable feed-forward and variable latency logic. Given the benefit of the present application, numerous other implementations of suitable feed-forward and variable latency logic/circuits/modules will occur to those skilled in the art.strong SRAM PUFs -
FIG. 9 shows acomputing device 158 that may be readily substituted for one or more of the electronic processing system 10 (FIG. 1 ), thesemiconductor apparatuses 20, 30 (FIGS. 2, 3 ), or may include the 60, 65, 67 (strong PUF apparatuses FIGS. 6A to 6C ), the strong SRAM PUF apparatus 70 (FIG. 7 ), and/or the strong SRAM PUF apparatus 80 (FIG. 8 ), already discussed. In the illustrated example, thedevice 158 includes a time source 160 (e.g., crystal oscillator, clock), abattery 162 to supply power to thedevice 158, a transceiver 164 (e.g., wireless or wired), adisplay 166 and mass storage 168 (e.g., hard disk drive/HDD, solid state disk/SSD, optical disk, flash memory). Thedevice 158 may also include a host processor 170 (e.g., CPU) having an integrated memory controller (IMC) 172, which may communicate withsystem memory 174. Thesystem memory 174 may include, for example, dynamic random access memory (DRAM) configured as one or more memory modules such as, for example, dual inline memory modules (DIMMs), small outline DIMMs (SODIMMs), etc. The illustrateddevice 158 also includes an input output (IO)module 176 implemented together with theprocessor 170 on asemiconductor die 178 as a system on chip (SoC), wherein theI0 module 176 functions as a host device and may communicate with, for example, thedisplay 166, thetransceiver 164, themass storage 168, and so forth. Themass storage 168 may include non-volatile memory (NVM) that stores one or more keys (e.g., MAC generation keys, encryption keys). - The
IO module 176 may includelogic 180 that causes the semiconductor die 178 to implement a strong PUF such as described in connection with, for example, the electronic processing system 10 (FIG. 1 ), thesemiconductor apparatuses 20, 30 (FIGS. 2, 3 ), or may include the 60, 65, 67 (strong PUF apparatuses FIGS. 6A to 6C ), the strong SRAM PUF apparatus 70 (FIG. 7 ), and/or the strong SRAM PUF apparatus 80 (FIG. 8 ). Thus, thelogic 180 may generate a first output from a PUF based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge. Additionally, or alternatively, thelogic 180 may generate a first output from a SRAM PUF based on a challenge, change a read sequence of the SRAM PUF based on the first output of the SRAM PUF, and generate a response based on the changed read sequence - In some embodiments, the
logic 180 may additionally or alternatively generate an output from a PUF based on a challenge, vary a latency of a LFSR based on the output from the PUF, and generate a response based on an output of the LFSR. For example, thelogic 180 may modify a number of cycles for the LFSR based on the output from the PUF. In some embodiments, thelogic 180 may also compress the response. In one example, thetime source 160 is autonomous/independent from the controller in order to enhance security (e.g., to prevent the controller from tampering with cadence, frequency, latency and/or timestamp data). Thelogic 180 may also be implemented elsewhere in thedevice 158. -
FIG. 10 illustrates aprocessor core 200 according to one embodiment. Theprocessor core 200 may be the core for any type of processor, such as a micro-processor, an embedded processor, a digital signal processor (DSP), a network processor, or other device to execute code. Although only oneprocessor core 200 is illustrated inFIG. 10 , a processing element may alternatively include more than one of theprocessor core 200 illustrated inFIG. 10 . Theprocessor core 200 may be a single-threaded core or, for at least one embodiment, theprocessor core 200 may be multithreaded in that it may include more than one hardware thread context (or “logical processor”) per core. -
FIG. 10 also illustrates amemory 270 coupled to theprocessor core 200. Thememory 270 may be any of a wide variety of memories (including various layers of memory hierarchy) as are known or otherwise available to those of skill in the art. Thememory 270 may include one ormore code 213 instruction(s) to be executed by theprocessor core 200, wherein thecode 213 may implement the method 40 (FIGS. 4A to 4C ), the method 50 (FIGS. 5A to 5C ) and/or the respective first and second passes (FIGS. 7 and 8 ), already discussed. Theprocessor core 200 follows a program sequence of instructions indicated by thecode 213. Each instruction may enter afront end portion 210 and be processed by one or more decoders 220. The decoder 220 may generate as its output a micro operation such as a fixed width micro operation in a predefined format, or may generate other instructions, microinstructions, or control signals which reflect the original code instruction. The illustratedfront end portion 210 also includesregister renaming logic 225 andscheduling logic 230, which generally allocate resources and queue the operation corresponding to the convert instruction for execution. - The
processor core 200 is shown includingexecution logic 250 having a set of execution units 255-1 through 255-N. Some embodiments may include a number of execution units dedicated to specific functions or sets of functions. Other embodiments may include only one execution unit or one execution unit that can perform a particular function. The illustratedexecution logic 250 performs the operations specified by code instructions. - After completion of execution of the operations specified by the code instructions,
back end logic 260 retires the instructions of thecode 213. In one embodiment, theprocessor core 200 allows out of order execution but requires in order retirement of instructions.Retirement logic 265 may take a variety of forms as known to those of skill in the art (e.g., re-order buffers or the like). In this manner, theprocessor core 200 is transformed during execution of thecode 213, at least in terms of the output generated by the decoder, the hardware registers and tables utilized by theregister renaming logic 225, and any registers (not shown) modified by theexecution logic 250. - Although not illustrated in
FIG. 10 , a processing element may include other elements on chip with theprocessor core 200. For example, a processing element may include memory control logic along with theprocessor core 200. The processing element may include I/O control logic and/or may include I/O control logic integrated with memory control logic. The processing element may also include one or more caches. - Referring now to
FIG. 11 , shown is a block diagram of acomputing system 1000 embodiment in accordance with an embodiment. Shown inFIG. 11 is amultiprocessor system 1000 that includes afirst processing element 1070 and asecond processing element 1080. While two 1070 and 1080 are shown, it is to be understood that an embodiment of theprocessing elements system 1000 may also include only one such processing element. - The
system 1000 is illustrated as a point-to-point interconnect system, wherein thefirst processing element 1070 and thesecond processing element 1080 are coupled via a point-to-point interconnect 1050. It should be understood that any or all of the interconnects illustrated inFIG. 11 may be implemented as a multi-drop bus rather than point-to-point interconnect. - As shown in
FIG. 11 , each of 1070 and 1080 may be multicore processors, including first and second processor cores (i.e.,processing elements 1074 a and 1074 b andprocessor cores 1084 a and 1084 b).processor cores 1074 a, 1074 b, 1084 a, 1084 b may be configured to execute instruction code in a manner similar to that discussed above in connection withSuch cores FIG. 10 . - Each
1070, 1080 may include at least one sharedprocessing element 1896 a, 1896 b. The sharedcache 1896 a, 1896 b may store data (e.g., instructions) that are utilized by one or more components of the processor, such as thecache 1074 a, 1074 b and 1084 a, 1084 b, respectively. For example, the sharedcores 1896 a, 1896 b may locally cache data stored in acache 1032, 1034 for faster access by components of the processor. In one or more embodiments, the sharedmemory 1896a, 1896b may include one or more mid-level caches, such as level 2 (L2), level 3 (L3), level 4 (L4), or other levels of cache, a last level cache (LLC), and/or combinations thereof.cache - While shown with only two
1070, 1080, it is to be understood that the scope of the embodiments is not so limited. In other embodiments, one or more additional processing elements may be present in a given processor. Alternatively, one or more ofprocessing elements 1070, 1080 may be an element other than a processor, such as an accelerator or a field programmable gate array. For example, additional processing element(s) may include additional processors(s) that are the same as aprocessing elements first processor 1070, additional processor(s) that are heterogeneous or asymmetric to processor afirst processor 1070, accelerators (such as, e.g., graphics accelerators or digital signal processing (DSP) units), field programmable gate arrays, or any other processing element. There can be a variety of differences between the 1070, 1080 in terms of a spectrum of metrics of merit including architectural, micro architectural, thermal, power consumption characteristics, and the like. These differences may effectively manifest themselves as asymmetry and heterogeneity amongst theprocessing elements 1070, 1080. For at least one embodiment, theprocessing elements 1070, 1080 may reside in the same die package.various processing elements - The
first processing element 1070 may further include memory controller logic (MC) 1072 and point-to-point (P-P) interfaces 1076 and 1078. Similarly, thesecond processing element 1080 may include aMC 1082 and 1086 and 1088. As shown inP-P interfaces FIG. 11 , MC's 1072 and 1082 couple the processors to respective memories, namely amemory 1032 and amemory 1034, which may be portions of main memory locally attached to the respective processors. While the 1072 and 1082 is illustrated as integrated into theMC 1070, 1080, for alternative embodiments the MC logic may be discrete logic outside theprocessing elements 1070, 1080 rather than integrated therein.processing elements - The
first processing element 1070 and thesecond processing element 1080 may be coupled to an I/O subsystem 1090 viaP-P interconnects 1076 1086, respectively. As shown inFIG. 11 , the I/O subsystem 1090 includes 1094 and 1098. Furthermore, I/P-P interfaces O subsystem 1090 includes aninterface 1092 to couple I/O subsystem 1090 with a highperformance graphics engine 1038. In one embodiment,bus 1049 may be used to couple thegraphics engine 1038 to the I/O subsystem 1090. Alternately, a point-to-point interconnect may couple these components. - In turn, I/
O subsystem 1090 may be coupled to afirst bus 1016 via aninterface 1096. In one embodiment, thefirst bus 1016 may be a Peripheral Component Interconnect (PCI) bus, or a bus such as a PCI Express bus or another third generation I/O interconnect bus, although the scope of the embodiments is not so limited. - As shown in
FIG. 11 , various I/O devices 1014 (e.g., biometric scanners, speakers, cameras, sensors) may be coupled to thefirst bus 1016, along with a bus bridge 1018 which may couple thefirst bus 1016 to asecond bus 1020. In one embodiment, thesecond bus 1020 may be a low pin count (LPC) bus. Various devices may be coupled to thesecond bus 1020 including, for example, a keyboard/mouse 1012, communication device(s) 1026, and adata storage unit 1019 such as a disk drive or other mass storage device which may includecode 1030, in one embodiment. The illustratedcode 1030 may implement the method 40 (FIGS. 4A to 4C ), the method 50 (FIGS. 5A to 5C ) and/or the respective first and second passes (FIGS. 7 and 8 ), already discussed, and may be similar to the code 213 (FIG. 10 ), already discussed. Further, an audio I/O 1024 may be coupled tosecond bus 1020 and abattery port 1010 may supply power to thecomputing system 1000. - Note that other embodiments are contemplated. For example, instead of the point-to-point architecture of
FIG. 11 , a system may implement a multi-drop bus or another such communication topology. Also, the elements ofFIG. 11 may alternatively be partitioned using more or fewer integrated chips than shown inFIG. 11 . - Example 1 may include an electronic processing system, comprising a processor, memory communicatively coupled to the processor, a PUF, and logic communicatively coupled to the processor and the PUF to generate a first output from the PUF based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge. Example 2 may include the system of Example 1, wherein the PUF comprises a SRAM, and wherein the logic is further to change a read sequence of the SRAM based on an output of the PUF. Example 3 may include the system of Example 1, further comprising a variable latency LFSR communicatively coupled to the logic. Example 4 may include the system of Example 3, wherein the logic is further to modify a number of cycles for the variable latency LFSR based on an output from the PUF. Example 5 may include the system of Example 4, further comprising a compressor communicatively coupled to the variable latency LFSR to compress the response. Example 6 may include the system of any of Examples 1 to 5, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 7 may include a semiconductor package apparatus, comprising one or more substrates, and a PUF coupled to the one or more substrates, and logic coupled to the PUF and to the one or more substrates, wherein the logic is at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic, the logic coupled to the one or more substrates to generate a first output from the PUF based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge. Example 8 may include the apparatus of Example 7, wherein the PUF comprises a SRAM, and wherein the logic is further to change a read sequence of the SRAM based on an output of the PUF. Example 9 may include the apparatus of Example 7, further comprising a variable latency LFSR communicatively coupled to the logic. Example 10 may include the apparatus of Example 9, wherein the logic is further to modify a number of cycles for the variable latency LFSR based on an output from the PUF. Example 11 may include the apparatus of Example 10, further comprising a compressor communicatively coupled to the variable latency LFSR to compress the response. Example 12 may include the apparatus of any of Examples 7 to 11, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function. Example 13 may include the apparatus of any of Examples 7 to 11, wherein the logic coupled to the one or more substrates includes transistor channel regions that are positioned within the one or more substrates.
- Example 14 may include a method of generating a response to a challenge, comprising generating a first output from a PUF based on a challenge, modifying the challenge based on the first output, and generating a response based on the modified challenge. Example 15 may include the method of Example 14, wherein the PUF comprises a SRAM, the method further comprising changing a read sequence of the SRAM based on an output of the PUF. Example 16 may include the method of Example 14, further comprising varying a latency of a LFSR based on an output from the PUF. Example 17 may include the method of Example 16, further comprising modifying a number of cycles for the LFSR based on an output from the PUF. Example 18 may include the method of Example 17, further comprising compressing an output of the LFSR to provide the response. Example 19 may include the method of any of Examples 14 to 18, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 20 may include a semiconductor package apparatus, comprising one or more substrates, and a PUF coupled to the one or more substrates, a LFSR communicatively coupled to the one or more substrates, and logic coupled to the PUF, the LFSR, and to the one or more substrates, wherein the logic is at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic, the logic coupled to the one or more substrates to generate an output from the PUF based on a challenge, vary a latency of the LFSR based on the output from the PUF, and generate a response based on an output of the LFSR. Example 21 may include the apparatus of Example 20, wherein the logic is further to modify a number of cycles for the LFSR based on the output from the PUF. Example 22 may include the apparatus of Example 20, further comprising a compressor communicatively coupled to the LFSR to compress the response. Example 23 may include the apparatus of Example 20, wherein the logic is further to modify the challenge based on the output of the PUF. Example 24 may include the apparatus of any of Examples 20 to 23, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function. Example 25 may include the apparatus of any of Examples 20 to 23, wherein the logic coupled to the one or more substrates includes transistor channel regions that are positioned within the one or more substrates.
- Example 26 may include a method of generating a response to a challenge, comprising generating an output from a PUF based on a challenge, varying a latency of a LFSR based on the output from the PUF, and generating a response based on an output of the LFSR. Example 27 may include the method of Example 26, further comprising modifying a number of cycles for the LFSR based on the output from the PUF. Example 28 may include the method of Example 26, further comprising compressing the response. Example 29 may include the method of Example 26, further comprising modifying the challenge based on the output of the PUF. Example 30 may include the method of any of Examples 26 to 29, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 31 may include at least one computer readable medium, comprising a set of instructions, which when executed by a computing device, cause the computing device to generate an output from a PUF based on a challenge, vary a latency of a LFSR based on the output from the PUF, and generate a response based on an output of the LFSR. Example 32 may include the at least one computer readable medium of Example 31, comprising a further set of instructions, which when executed by the computing device, cause the computing device to modify a number of cycles for the LFSR based on the output from the PUF. Example 33 may include the at least one computer readable medium of Example 31, comprising a further set of instructions, which when executed by the computing device, cause the computing device to compress the response. Example 34 may include the at least one computer readable medium of Example 31, comprising a further set of instructions, which when executed by the computing device, cause the computing device to modify the challenge based on the output of the PUF. Example 35 may include the at least one computer readable medium of any of Examples 31 to 34, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 36 may include a strong PUF apparatus, comprising means for generating an output from a PUF based on a challenge, means for varying a latency of a LFSR based on the output from the PUF, and means for generating a response based on an output of the LFSR. Example 37 may include the apparatus of Example 36, further comprising means for modifying a number of cycles for the LFSR based on the output from the PUF. Example 38 may include the apparatus of Example 36, further comprising means for compressing the response. Example 39 may include the apparatus of Example 36, further comprising means for modifying the challenge based on the output of the PUF. Example 40 may include the apparatus of any of Examples 36 to 39, wherein PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 41 may include at least one computer readable medium, comprising a set of instructions, which when executed by a computing device, cause the computing device to generate a first output from a PUF based on a challenge, modify the challenge based on the first output, and generate a response based on the modified challenge. Example 42 may include the at least one computer readable medium of Example 41, wherein the PUF comprises a SRAM, comprising a further set of instructions, which when executed by the computing device, cause the computing device to change a read sequence of the SRAM based on an output of the PUF. Example 43 may include the at least one computer readable medium of Example 41, comprising a further set of instructions, which when executed by the computing device, cause the computing device to vary a latency of a LFSR based on an output from the PUF. Example 44 may include the at least one computer readable medium of Example 43, comprising a further set of instructions, which when executed by the computing device, cause the computing device to modify a number of cycles for the LFSR based on an output from the PUF. Example 45 may include the at least one computer readable medium of Example 44, comprising a further set of instructions, which when executed by the computing device, cause the computing device to compress an output of the LFSR to provide the response. Example 46 may include the at least one computer readable medium of any of Examples 41 to 45, wherein PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 47 may include a strong PUF apparatus, comprising means for generating a first output from a PUF based on a challenge, means for modifying the challenge based on the first output, and means for generating a response based on the modified challenge. Example 48 may include the apparatus of Example 47, wherein the PUF comprises a SRAM, the apparatus further comprising means for changing a read sequence of the SRAM based on an output of the PUF. Example 49 may include the apparatus of Example 47, further comprising means for varying a latency of a LFSR based on an output from the PUF. Example 50 may include the apparatus of Example 49, further comprising means for modifying a number of cycles for the LFSR based on an output from the PUF. Example 51 may include the apparatus of Example 50, further comprising means for compressing an output of the LFSR to provide the response.
- Example 52 may include the apparatus of any of Examples 47 to 51, wherein the PUF comprises one or more of a memory-based unclonable function and a timing-based unclonable function.
- Example 53 may include an electronic processing system, comprising a processor, memory communicatively coupled to the processor, a SRAM PUF, and logic communicatively coupled to the processor and the SRAM PUF to generate a first output from the SRAM PUF based on a challenge, change a read sequence of the SRAM PUF based on the first output of the SRAM PUF, and generate a response based on the changed read sequence. Example 54 may include the system of Example 53, further comprising a variable latency LFSR communicatively coupled to the logic. Example 55 may include the system of Example 54, wherein the logic is further to modify a number of cycles for the variable latency LFSR based on a second output from the SRAM PUF. Example 56 may include the system of Example 55, further comprising a compressor communicatively coupled to the variable latency LFSR to compress the response.
- Example 57 may include a semiconductor package apparatus, comprising one or more substrates, and a SRAM PUF coupled to the one or more substrates, and logic coupled to the SRAM PUF and to the one or more substrates, wherein the logic is at least partly implemented in one or more of configurable logic and fixed-functionality hardware logic, the logic coupled to the one or more substrates to generate a first output from the SRAM PUF based on a challenge, change a read sequence of the SRAM PUF based on the first output of the SRAM PUF, and generate a response based on the changed read sequence. Example 58 may include the apparatus of Example 57, further comprising a variable latency LFSR communicatively coupled to the logic. Example 59 may include the apparatus of Example 58, wherein the logic is further to modify a number of cycles for the variable latency LFSR based on a second output from the SRAM PUF. Example 60 may include the apparatus of Example 59, further comprising a compressor communicatively coupled to the variable latency LFSR to compress the response. Example 61 may include the apparatus of any of Examples 57 to 60, wherein the logic coupled to the one or more substrates includes transistor channel regions that are positioned within the one or more substrates.
- Example 62 may include a method of generating a response to a challenge, comprising generating a first output from a SRAM PUF based on a challenge, changing a read sequence of the SRAM PUF based on the first output of the SRAM PUF, and generating a response based on the changed read sequence. Example 63 may include the method of Example 62, further comprising varying a latency of a LFSR based on a second output from the SRAM PUF. Example 64 may include the method of Example 63, further comprising modifying a number of cycles for the LFSR based on the second output from the SRAM PUF. Example 65 may include the method of Example 64, further comprising compressing an output of the LFSR to provide the response.
- Embodiments are applicable for use with all types of semiconductor integrated circuit (“IC”) chips. Examples of these IC chips include but are not limited to processors, controllers, chipset components, programmable logic arrays (PLAs), memory chips, network chips, systems on chip (SoCs), SSD/NAND controller ASICs, and the like. In addition, in some of the drawings, signal conductor lines are represented with lines. Some may be different, to indicate more constituent signal paths, have a number label, to indicate a number of constituent signal paths, and/or have arrows at one or more ends, to indicate primary information flow direction. This, however, should not be construed in a limiting manner. Rather, such added detail may be used in connection with one or more exemplary embodiments to facilitate easier understanding of a circuit. Any represented signal lines, whether or not having additional information, may actually comprise one or more signals that may travel in multiple directions and may be implemented with any suitable type of signal scheme, e.g., digital or analog lines implemented with differential pairs, optical fiber lines, and/or single-ended lines.
- Example sizes/models/values/ranges may have been given, although embodiments are not limited to the same. As manufacturing techniques (e.g., photolithography) mature over time, it is expected that devices of smaller size could be manufactured. In addition, well known power/ground connections to IC chips and other components may or may not be shown within the figures, for simplicity of illustration and discussion, and so as not to obscure certain aspects of the embodiments. Further, arrangements may be shown in block diagram form in order to avoid obscuring embodiments, and also in view of the fact that specifics with respect to implementation of such block diagram arrangements are highly dependent upon the platform within which the embodiment is to be implemented, i.e., such specifics should be well within purview of one skilled in the art. Where specific details (e.g., circuits) are set forth in order to describe example embodiments, it should be apparent to one skilled in the art that embodiments can be practiced without, or with variation of, these specific details. The description is thus to be regarded as illustrative instead of limiting.
- The term “coupled” may be used herein to refer to any type of relationship, direct or indirect, between the components in question, and may apply to electrical, mechanical, fluid, optical, electromagnetic, electromechanical or other connections. In addition, the terms “first”, “second”, etc. may be used herein only to facilitate discussion, and carry no particular temporal or chronological significance unless otherwise indicated.
- As used in this application and in the claims, a list of items joined by the term “one or more of” may mean any combination of the listed terms. For example, the phrase “one or more of A, B, and C” and the phrase “one or more of A, B, or C” both may mean A; B; C; A and B; A and C; B and C; or A, B and C.
- Those skilled in the art will appreciate from the foregoing description that the broad techniques of the embodiments can be implemented in a variety of forms. Therefore, while the embodiments have been described in connection with particular examples thereof, the true scope of the embodiments should not be so limited since other modifications will become apparent to the skilled practitioner upon a study of the drawings, specification, and following claims.
Claims (25)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/941,050 US11082241B2 (en) | 2018-03-30 | 2018-03-30 | Physically unclonable function with feed-forward addressing and variable latency output |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/941,050 US11082241B2 (en) | 2018-03-30 | 2018-03-30 | Physically unclonable function with feed-forward addressing and variable latency output |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20190044739A1 true US20190044739A1 (en) | 2019-02-07 |
| US11082241B2 US11082241B2 (en) | 2021-08-03 |
Family
ID=65230545
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/941,050 Expired - Fee Related US11082241B2 (en) | 2018-03-30 | 2018-03-30 | Physically unclonable function with feed-forward addressing and variable latency output |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US11082241B2 (en) |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020256809A1 (en) * | 2019-06-20 | 2020-12-24 | Intel Corporation | Method and apparatus to provide memory based physically unclonable functions |
| US20210119812A1 (en) * | 2020-12-23 | 2021-04-22 | Intel Corporation | Time-based multi-dimensional key recreation mechanism using puf technologies |
| US11196574B2 (en) * | 2017-08-17 | 2021-12-07 | Taiwan Semiconductor Manufacturing Company, Ltd. | Physically unclonable function (PUF) generation |
| CN113810194A (en) * | 2020-06-16 | 2021-12-17 | 华为技术有限公司 | A PUF-based excitation-response pair generation device and method |
| US11245528B1 (en) * | 2018-11-19 | 2022-02-08 | Protocol Labs, Inc. | Protocols for decentralized networks |
| US11374774B2 (en) * | 2020-04-28 | 2022-06-28 | Regents Of The University Of Minnesota | Feed-forward XOR physical unclonable functions |
| CN114830598A (en) * | 2020-11-20 | 2022-07-29 | 京东方科技集团股份有限公司 | Security protection method and device for heterogeneous system and processor |
| CN114928454A (en) * | 2022-06-09 | 2022-08-19 | 湖南大学 | CRP (common noise control) obfuscation circuit and data obfuscation method |
| US11570001B1 (en) | 2018-07-12 | 2023-01-31 | Protocol Labs, Inc. | Protocols for decentralized networks |
| US12395358B2 (en) | 2020-06-26 | 2025-08-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Security component having physically unclonable function (PUF) and method of operation |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11856114B2 (en) * | 2021-02-12 | 2023-12-26 | Taiwan Semiconductor Manufacturing Co., Ltd. | Device signature based on trim and redundancy information |
Citations (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5210864A (en) * | 1989-06-01 | 1993-05-11 | Mitsubishi Denki Kabushiki Kaisha | Pipelined microprocessor with instruction execution control unit which receives instructions from separate path in test mode for testing instruction execution pipeline |
| US5301199A (en) * | 1991-12-16 | 1994-04-05 | Nippon Telegraph And Telephone Corporation | Built-in self test circuit |
| US5617531A (en) * | 1993-11-02 | 1997-04-01 | Motorola, Inc. | Data Processor having a built-in internal self test controller for testing a plurality of memories internal to the data processor |
| US5668810A (en) * | 1995-04-26 | 1997-09-16 | Scientific-Atlanta, Inc. | Data transmission protocol method and apparatus |
| US5774477A (en) * | 1995-12-22 | 1998-06-30 | Lucent Technologies Inc. | Method and apparatus for pseudorandom boundary-scan testing |
| US20030025191A1 (en) * | 2001-07-03 | 2003-02-06 | Sadami Takeoka | Semiconductor wiring substrate, semiconductor device, method for testing semiconductor device, and method for mounting semiconductor device |
| US20030229838A1 (en) * | 2002-06-11 | 2003-12-11 | Fujitsu Limited | Apparatus and method for diagnosing integrated circuit, and integrated circuit |
| US20030229886A1 (en) * | 2002-05-08 | 2003-12-11 | Tetsu Hasegawa | Semiconductor integrated circuit, design support apparatus, and test method |
| US20050034041A1 (en) * | 2003-06-24 | 2005-02-10 | Stmicroelectronics S.R.I. | Integrated device with an improved BIST circuit for executing a structured test |
| US20050077905A1 (en) * | 2001-12-04 | 2005-04-14 | Mamoru Sasaki | Testing method and tester for semiconductor integrated circuit device comprising high-speed input/output element |
| US20060271792A1 (en) * | 2002-04-16 | 2006-11-30 | Srinivas Devadas | Data protection and cryptographic functions using a device-specific value |
| US20070016826A1 (en) * | 2005-05-31 | 2007-01-18 | Stmicroelectronics Pvt. Ltd. | Configurable memory architecture with built-in testing mechanism |
| US7409608B1 (en) * | 2004-04-20 | 2008-08-05 | Altera Corporation | Pseudo-random wait-state and pseudo-random latency components |
| US20090083833A1 (en) * | 2007-09-19 | 2009-03-26 | Verayo, Inc. | Authentication with physical unclonable functions |
| US20100127822A1 (en) * | 2008-11-21 | 2010-05-27 | Verayo, Inc. | Non-networked rfid-puf authentication |
| US20100165719A1 (en) * | 2006-07-27 | 2010-07-01 | Fabio Pellizzer | Phase change memory device |
| US20100174955A1 (en) * | 2009-01-08 | 2010-07-08 | International Business Machines Corporation | Test and bring-up of an enhanced cascade interconnect memory system |
| US7877604B2 (en) * | 2003-05-16 | 2011-01-25 | Intrinsic Id B.V. | Proof of execution using random function |
| US20130142329A1 (en) * | 2011-12-02 | 2013-06-06 | Cisco Technology, Inc. | Utilizing physically unclonable functions to derive device specific keying material for protection of information |
| US8516269B1 (en) * | 2010-07-28 | 2013-08-20 | Sandia Corporation | Hardware device to physical structure binding and authentication |
| US8525169B1 (en) * | 2012-08-10 | 2013-09-03 | International Business Machines Corporation | Reliable physical unclonable function for device authentication |
| US20140041040A1 (en) * | 2012-08-01 | 2014-02-06 | The Regents Of The University Of California | Creating secure multiparty communication primitives using transistor delay quantization in public physically unclonable functions |
| US8667265B1 (en) * | 2010-07-28 | 2014-03-04 | Sandia Corporation | Hardware device binding and mutual authentication |
| US20140140502A1 (en) * | 2012-11-19 | 2014-05-22 | International Business Machines Corporation | Reliable physical unclonable function for device authentication |
| US20140189890A1 (en) * | 2012-12-28 | 2014-07-03 | Patrick Koeberl | Device authentication using a physically unclonable functions based key generation system |
| US20150101037A1 (en) * | 2013-10-03 | 2015-04-09 | Qualcomm Incorporated | Physically unclonable function pattern matching for device identification |
| US9264048B2 (en) * | 2013-12-18 | 2016-02-16 | Intel Corporation | Secret operations using reconfigurable logics |
| US20160301534A1 (en) * | 2015-04-07 | 2016-10-13 | Globalfoundries Inc. | Method, apparatus and system for security application for integrated circuit devices |
| US20160364582A1 (en) * | 2015-06-12 | 2016-12-15 | Qualcomm Incorporated | Techniques for integrated circuit data path confidentiality and extensions thereof |
| US20170038807A1 (en) * | 2015-08-03 | 2017-02-09 | Texas Instruments Incorporated | Methods and apparatus to create a physically unclonable function |
| US20170048072A1 (en) * | 2015-08-13 | 2017-02-16 | Arizona Board Of Regents Acting For And On Behalf Of Northern Arizona University | Physically Unclonable Function Generating Systems and Related Methods |
| US20170077046A1 (en) * | 2015-09-11 | 2017-03-16 | The Regents Of The University Of California | Physical unclonable functions through locally enhanced defectivity |
| US20170126414A1 (en) * | 2015-10-28 | 2017-05-04 | Texas Instruments Incorporated | Database-less authentication with physically unclonable functions |
| US20170329954A1 (en) * | 2016-05-13 | 2017-11-16 | Regents Of The University Of Minnesota | Robust device authentication |
| US20170364709A1 (en) * | 2014-12-15 | 2017-12-21 | Stc.Unm | Reliability enhancement methods for physically unclonable function bitstring generation |
| US10027472B2 (en) * | 2016-09-27 | 2018-07-17 | Intel Corporation | Non-linear physically unclonable function (PUF) circuit with machine-learning attack resistance |
| US10079678B2 (en) * | 2012-07-24 | 2018-09-18 | Intel Corporation | Providing access to encrypted data |
| US20190190725A1 (en) * | 2017-12-18 | 2019-06-20 | Intel Corporation | Physically unclonable function implemented with spin orbit coupling based magnetic memory |
| US20190238519A1 (en) * | 2018-01-31 | 2019-08-01 | Dell Products L. P. | Layered encryption for end to end communication |
Family Cites Families (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102656588B (en) * | 2009-08-14 | 2015-07-15 | 本质Id有限责任公司 | Physically unclonable function with tamper prevention and anti-aging system |
| US20110299678A1 (en) * | 2010-06-07 | 2011-12-08 | Alexander Roger Deas | Secure means for generating a specific key from unrelated parameters |
| WO2012122994A1 (en) * | 2011-03-11 | 2012-09-20 | Kreft Heinz | Off-line transfer of electronic tokens between peer-devices |
| US8478990B2 (en) * | 2011-06-02 | 2013-07-02 | Cryptite LLC | Mobile transaction methods and devices with three-dimensional colorgram tokens |
| US20130147511A1 (en) * | 2011-12-07 | 2013-06-13 | Patrick Koeberl | Offline Device Authentication and Anti-Counterfeiting Using Physically Unclonable Functions |
| KR101419745B1 (en) * | 2012-08-07 | 2014-07-17 | 한국전자통신연구원 | Authentication processing apparatus, authentication requesting apparatus and authentication executing method based on physically unclonable fuctions |
| US9444618B1 (en) * | 2013-04-22 | 2016-09-13 | Xilinx, Inc. | Defense against attacks on ring oscillator-based physically unclonable functions |
| US9787480B2 (en) * | 2013-08-23 | 2017-10-10 | Qualcomm Incorporated | Applying circuit delay-based physically unclonable functions (PUFs) for masking operation of memory-based PUFs to resist invasive and clone attacks |
| US9806718B2 (en) * | 2014-05-05 | 2017-10-31 | Analog Devices, Inc. | Authenticatable device with reconfigurable physical unclonable functions |
| US10129036B2 (en) * | 2014-09-18 | 2018-11-13 | Intel Corporation | Post-processing mechanism for physically unclonable functions |
| US10177922B1 (en) * | 2015-03-25 | 2019-01-08 | National Technology & Engineering Solutions Of Sandia, Llc | Repeatable masking of sensitive data |
| EP3113409B1 (en) * | 2015-07-01 | 2024-09-18 | Secure-IC SAS | Embedded test circuit for physically unclonable function |
| US10956557B2 (en) * | 2016-01-11 | 2021-03-23 | Stc.Unm | Privacy-preserving, mutual PUF-based authentication protocol |
| US10511451B2 (en) * | 2016-11-04 | 2019-12-17 | Taiwan Semiconductor Manufacturing Company Ltd. | Physically unclonable function (PUF) device and method of extending challenge/response pairs in a PUF device |
| WO2018141378A1 (en) * | 2017-02-01 | 2018-08-09 | Telefonaktiebolaget Lm Ericsson (Publ) | Methods and devices for protecting data |
| US10263793B2 (en) * | 2017-07-18 | 2019-04-16 | Square, Inc. | Devices with modifiable physically unclonable functions |
| CN109428721B (en) * | 2017-08-28 | 2023-06-30 | 恩智浦有限公司 | Method or device for determining the health of a physically unclonable function |
| US10103895B1 (en) * | 2017-10-13 | 2018-10-16 | Macronix International Co., Ltd. | Method for physically unclonable function-identification generation and apparatus of the same |
| US10915635B2 (en) * | 2017-12-22 | 2021-02-09 | The Boeing Company | Countermeasures to frequency alteration attacks on ring oscillator based physical unclonable functions |
-
2018
- 2018-03-30 US US15/941,050 patent/US11082241B2/en not_active Expired - Fee Related
Patent Citations (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5210864A (en) * | 1989-06-01 | 1993-05-11 | Mitsubishi Denki Kabushiki Kaisha | Pipelined microprocessor with instruction execution control unit which receives instructions from separate path in test mode for testing instruction execution pipeline |
| US5301199A (en) * | 1991-12-16 | 1994-04-05 | Nippon Telegraph And Telephone Corporation | Built-in self test circuit |
| US5617531A (en) * | 1993-11-02 | 1997-04-01 | Motorola, Inc. | Data Processor having a built-in internal self test controller for testing a plurality of memories internal to the data processor |
| US5668810A (en) * | 1995-04-26 | 1997-09-16 | Scientific-Atlanta, Inc. | Data transmission protocol method and apparatus |
| US5774477A (en) * | 1995-12-22 | 1998-06-30 | Lucent Technologies Inc. | Method and apparatus for pseudorandom boundary-scan testing |
| US20030025191A1 (en) * | 2001-07-03 | 2003-02-06 | Sadami Takeoka | Semiconductor wiring substrate, semiconductor device, method for testing semiconductor device, and method for mounting semiconductor device |
| US20050077905A1 (en) * | 2001-12-04 | 2005-04-14 | Mamoru Sasaki | Testing method and tester for semiconductor integrated circuit device comprising high-speed input/output element |
| US20060271792A1 (en) * | 2002-04-16 | 2006-11-30 | Srinivas Devadas | Data protection and cryptographic functions using a device-specific value |
| US20030229886A1 (en) * | 2002-05-08 | 2003-12-11 | Tetsu Hasegawa | Semiconductor integrated circuit, design support apparatus, and test method |
| US20030229838A1 (en) * | 2002-06-11 | 2003-12-11 | Fujitsu Limited | Apparatus and method for diagnosing integrated circuit, and integrated circuit |
| US7877604B2 (en) * | 2003-05-16 | 2011-01-25 | Intrinsic Id B.V. | Proof of execution using random function |
| US20050034041A1 (en) * | 2003-06-24 | 2005-02-10 | Stmicroelectronics S.R.I. | Integrated device with an improved BIST circuit for executing a structured test |
| US7409608B1 (en) * | 2004-04-20 | 2008-08-05 | Altera Corporation | Pseudo-random wait-state and pseudo-random latency components |
| US20070016826A1 (en) * | 2005-05-31 | 2007-01-18 | Stmicroelectronics Pvt. Ltd. | Configurable memory architecture with built-in testing mechanism |
| US20100165719A1 (en) * | 2006-07-27 | 2010-07-01 | Fabio Pellizzer | Phase change memory device |
| US20090083833A1 (en) * | 2007-09-19 | 2009-03-26 | Verayo, Inc. | Authentication with physical unclonable functions |
| US20100127822A1 (en) * | 2008-11-21 | 2010-05-27 | Verayo, Inc. | Non-networked rfid-puf authentication |
| US20100174955A1 (en) * | 2009-01-08 | 2010-07-08 | International Business Machines Corporation | Test and bring-up of an enhanced cascade interconnect memory system |
| US8667265B1 (en) * | 2010-07-28 | 2014-03-04 | Sandia Corporation | Hardware device binding and mutual authentication |
| US8516269B1 (en) * | 2010-07-28 | 2013-08-20 | Sandia Corporation | Hardware device to physical structure binding and authentication |
| US20130142329A1 (en) * | 2011-12-02 | 2013-06-06 | Cisco Technology, Inc. | Utilizing physically unclonable functions to derive device specific keying material for protection of information |
| US10079678B2 (en) * | 2012-07-24 | 2018-09-18 | Intel Corporation | Providing access to encrypted data |
| US20140041040A1 (en) * | 2012-08-01 | 2014-02-06 | The Regents Of The University Of California | Creating secure multiparty communication primitives using transistor delay quantization in public physically unclonable functions |
| US8525169B1 (en) * | 2012-08-10 | 2013-09-03 | International Business Machines Corporation | Reliable physical unclonable function for device authentication |
| US20140140502A1 (en) * | 2012-11-19 | 2014-05-22 | International Business Machines Corporation | Reliable physical unclonable function for device authentication |
| US20140189890A1 (en) * | 2012-12-28 | 2014-07-03 | Patrick Koeberl | Device authentication using a physically unclonable functions based key generation system |
| US20150101037A1 (en) * | 2013-10-03 | 2015-04-09 | Qualcomm Incorporated | Physically unclonable function pattern matching for device identification |
| US9264048B2 (en) * | 2013-12-18 | 2016-02-16 | Intel Corporation | Secret operations using reconfigurable logics |
| US20170364709A1 (en) * | 2014-12-15 | 2017-12-21 | Stc.Unm | Reliability enhancement methods for physically unclonable function bitstring generation |
| US20160301534A1 (en) * | 2015-04-07 | 2016-10-13 | Globalfoundries Inc. | Method, apparatus and system for security application for integrated circuit devices |
| US20160364582A1 (en) * | 2015-06-12 | 2016-12-15 | Qualcomm Incorporated | Techniques for integrated circuit data path confidentiality and extensions thereof |
| US20170038807A1 (en) * | 2015-08-03 | 2017-02-09 | Texas Instruments Incorporated | Methods and apparatus to create a physically unclonable function |
| US20170048072A1 (en) * | 2015-08-13 | 2017-02-16 | Arizona Board Of Regents Acting For And On Behalf Of Northern Arizona University | Physically Unclonable Function Generating Systems and Related Methods |
| US20170077046A1 (en) * | 2015-09-11 | 2017-03-16 | The Regents Of The University Of California | Physical unclonable functions through locally enhanced defectivity |
| US20170126414A1 (en) * | 2015-10-28 | 2017-05-04 | Texas Instruments Incorporated | Database-less authentication with physically unclonable functions |
| US20170329954A1 (en) * | 2016-05-13 | 2017-11-16 | Regents Of The University Of Minnesota | Robust device authentication |
| US10027472B2 (en) * | 2016-09-27 | 2018-07-17 | Intel Corporation | Non-linear physically unclonable function (PUF) circuit with machine-learning attack resistance |
| US20190190725A1 (en) * | 2017-12-18 | 2019-06-20 | Intel Corporation | Physically unclonable function implemented with spin orbit coupling based magnetic memory |
| US20190238519A1 (en) * | 2018-01-31 | 2019-08-01 | Dell Products L. P. | Layered encryption for end to end communication |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11196574B2 (en) * | 2017-08-17 | 2021-12-07 | Taiwan Semiconductor Manufacturing Company, Ltd. | Physically unclonable function (PUF) generation |
| US12294654B1 (en) | 2018-07-12 | 2025-05-06 | Protocol Labs, Inc. | Protocols for decentralized networks |
| US11570001B1 (en) | 2018-07-12 | 2023-01-31 | Protocol Labs, Inc. | Protocols for decentralized networks |
| US11245528B1 (en) * | 2018-11-19 | 2022-02-08 | Protocol Labs, Inc. | Protocols for decentralized networks |
| WO2020256809A1 (en) * | 2019-06-20 | 2020-12-24 | Intel Corporation | Method and apparatus to provide memory based physically unclonable functions |
| US11483167B2 (en) | 2019-06-20 | 2022-10-25 | Intel Corporation | Method and apparatus to provide memory based physically unclonable functions |
| US11374774B2 (en) * | 2020-04-28 | 2022-06-28 | Regents Of The University Of Minnesota | Feed-forward XOR physical unclonable functions |
| WO2021254129A1 (en) * | 2020-06-16 | 2021-12-23 | 华为技术有限公司 | Challenge-response pair generation apparatus and method based on puf |
| CN113810194A (en) * | 2020-06-16 | 2021-12-17 | 华为技术有限公司 | A PUF-based excitation-response pair generation device and method |
| US12395358B2 (en) | 2020-06-26 | 2025-08-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Security component having physically unclonable function (PUF) and method of operation |
| CN114830598A (en) * | 2020-11-20 | 2022-07-29 | 京东方科技集团股份有限公司 | Security protection method and device for heterogeneous system and processor |
| US12499219B2 (en) | 2020-11-20 | 2025-12-16 | Beijing Boe Technology Development Co., Ltd. | Security protection method for heterogeneous system that is capable of reconstructing mapping of PUF circuit, non-volatile computer-readable storage medium, electronic device, and processor |
| US20210119812A1 (en) * | 2020-12-23 | 2021-04-22 | Intel Corporation | Time-based multi-dimensional key recreation mechanism using puf technologies |
| CN114928454A (en) * | 2022-06-09 | 2022-08-19 | 湖南大学 | CRP (common noise control) obfuscation circuit and data obfuscation method |
Also Published As
| Publication number | Publication date |
|---|---|
| US11082241B2 (en) | 2021-08-03 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11082241B2 (en) | Physically unclonable function with feed-forward addressing and variable latency output | |
| Kim et al. | D-RaNGe: Using commodity DRAM devices to generate true random numbers with low latency and high throughput | |
| Kim et al. | SHARP: A short-word hierarchical accelerator for robust and practical fully homomorphic encryption | |
| Olgun et al. | QUAC-TRNG: High-throughput true random number generation using quadruple row activation in commodity DRAM chips | |
| CN104620254B (en) | Parallelized counter tree climbing for low-overhead memory replay protection | |
| US8402349B2 (en) | Two dimensional data randomization for a memory | |
| CN106575346B (en) | Cryptographic integrity check in memory | |
| US10396978B2 (en) | Crypto devices, storage devices having the same, and encryption and decryption methods thereof | |
| US9048834B2 (en) | Grouping of physically unclonable functions | |
| US9678894B2 (en) | Cache-less split tracker architecture for replay protection trees | |
| KR102488636B1 (en) | Encryption device encrypting data and timestamp, system on chip including the same, and electronic device | |
| US11222127B2 (en) | Processor hardware and instructions for SHA3 cryptographic operations | |
| US20220171887A1 (en) | Memory systems and devices including examples of generating access codes for memory regions using authentication logic | |
| US8924740B2 (en) | Encryption key transmission with power analysis attack resistance | |
| CN111008407A (en) | Encryption circuit for performing virtual encryption operations | |
| TW202211033A (en) | Memory device | |
| US11429580B2 (en) | Collision-free hashing for accessing cryptographic computing metadata and for cache expansion | |
| US20170180116A1 (en) | End-to-end protection scheme involving encrypted memory and storage | |
| US11995006B2 (en) | Algebraic and deterministic memory authentication and correction with coupled cacheline metadata | |
| US20170344759A1 (en) | Electronic circuit performing encryption/decryption operation to prevent side-channel analysis attack, and electronic device including the same | |
| CN106933510B (en) | a storage controller | |
| US9014370B2 (en) | High performance hardware-based execution unit for performing C2 block cipher encryption/decryption | |
| US12019563B2 (en) | Cache set permutations based on Galois Field operations | |
| US20240004801A1 (en) | Data encryption suitable for use in systems with processing-in-memory | |
| Rotaru et al. | A Mathematical Model for XOR-Based Application Specific DRAM Address Mapping Schemes |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| AS | Assignment |
Owner name: INTEL CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SACHDEV, MANOJ;SURESH, VIKRAM;MATHEW, SANU;AND OTHERS;SIGNING DATES FROM 20180308 TO 20180328;REEL/FRAME:045408/0223 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT RECEIVED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
| FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20250803 |